Computer security software

Results: 11097



#Item
661Software / System software / Computer architecture / Energy conservation / Sleep mode / Shutdown / Booting / Gamepad / Computer mouse / Reset button / AV Security Suite

TURNING THE POWER ON AND OFF SHARP AQUOS MONITOR DELL COMPUTER

Add to Reading List

Source URL: libraries.uark.edu

Language: English - Date: 2016-02-29 16:35:50
662Software development / Software / Extreme programming / Agile software development / Continuous integration / Git / Software testing / Computer security

Project 9 - ! Smarter Testing of Evolving Software Systems Leon Moonen, Thomas Rolfsnes, Stefano Di Alesio, Razieh Behjati

Add to Reading List

Source URL: certus-sfi.no

Language: English - Date: 2015-11-11 05:14:18
663Computing / Central processing unit / Computer architecture / Computer engineering / Cache / Instruction set / Opcode / Program counter / Computer / Tag / CPU cache

Micro-Policies: Formally Verified Tagging Schemes for Safety and Security (Extended Abstract) C˘at˘alin Hrit¸cu (INRIA Paris)1 Today’s computer systems are distressingly insecure. A host of vulnerabilities arise fro

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2014-07-17 09:25:53
664

Presented at the National Security Agency’s third High Confidence Software and Systems Conference, Baltimore MD, April 2003 Introducing Cyberlogic? Harald Rueß and Natarajan Shankar Computer Science Laboratory

Add to Reading List

Source URL: www.csl.sri.com

Language: English - Date: 2015-04-22 13:40:33
    665Computing / Software / Computer security / Internet security / Computer network security / Internet privacy / Domain name system / DNS rebinding / Cyberwarfare / NoScript / Proxy server / Cross-site scripting

    Protecting Browsers from DNS Rebinding Attacks Collin Jackson Adam Barth Andrew Bortz

    Add to Reading List

    Source URL: www.abortz.net

    Language: English - Date: 2016-01-16 18:17:58
    666Antivirus software / Cloud infrastructure / Cloud computing / Computer security / Malware / F-Secure / Zscaler / HP Cloud

    F-Secure Security Cloud: Purpose, function and benefits

    Add to Reading List

    Source URL: www.f-secure.com

    Language: English - Date: 2015-11-04 04:10:16
    667Computing / Enterprise application integration / Security / SOA Security / Decentralization / Software as a service / Cloud computing / Computer security

    Issue LXI • AprilReducing Application Cost and Risk through Centralized SOA Security by Mamoon Yunus, CEO of Crosscheck Networks

    Add to Reading List

    Source URL: www.servicetechmag.com

    Language: English - Date: 2012-04-24 20:38:15
    668Computer security / Computing / Software engineering / Hacking / Cross-site scripting / Computer worms / Hypertext Transfer Protocol / Cross-platform software / JavaScript / Samy / Same-origin policy / HTTP cookie

    Blackbox Reversing of XSS Filters Alexander Sotirov Introduction

    Add to Reading List

    Source URL: www.trailofbits.com

    Language: English - Date: 2016-04-15 11:36:17
    669Computing / Information technology management / Version control systems / Configuration management / Information technology / Technical communication / Computer network security / Method engineering / Baseline / Business process management / Software configuration management / Computer security

    T H R E AT STA C K OV ER SIGHT SM

    Add to Reading List

    Source URL: www.threatstack.com

    Language: English - Date: 2016-02-16 12:27:49
    670Software / System software / Computer architecture / Sandbox / Kernel / Systrace / Security-Enhanced Linux / Chroot / Operating system / Ptrace / Code injection / JavaScript

    TxBox: Building Secure, Efficient Sandboxes with System Transactions Suman Jana The University of Texas at Austin Donald E. Porter

    Add to Reading List

    Source URL: www3.cs.stonybrook.edu

    Language: English - Date: 2011-03-07 14:32:49
    UPDATE