Computer security software

Results: 11097



#Item
691Computing / Software / Computer graphics / Password / Security / Portable Document Format / DocumentCloud / Pass

Kaas & Mulvad | | DocumentCloud EXERCISE WHAT WHY

Add to Reading List

Source URL: 46.38.172.73

Language: English
692Computer network security / Deep packet inspection / Internet censorship / Net neutrality / File sharing / Firewall / Internet / Content-control software / Sandvine / Telecoms Package / Copyright infringement / Peer-to-peer

Microsoft Word - Filtering.briefing.doc

Add to Reading List

Source URL: www.iptegrity.com

Language: English - Date: 2011-08-21 08:05:13
693Software / Computing / System software / IPsec / Computer network security / Virtual private networks / Cryptographic software / Key management / StrongSwan / Internet Key Exchange / NetworkManager / Maemo

The Open Source VPN Solution for Mobile Platforms  Fully Integrated NetworkManager Applets for the Gnome and KDE 4 Plasma Linux Desktops.  strongSwan Applets for Android and Nokia Maemo.

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2010-06-11 08:23:07
694Computer security / Security / Computer network security / Computing / Software testing / Codenomicon / Coriant / Vulnerability management

Creating Trust with Coriant Power suppliers, critical infrastructure providers, and network builders all operate in an unsafe world, where cyber attacks and network malfunctions can disrupt services. Coriant’s customer

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
695Computing / Computer security / Software / Project management / Threat model / Business / Enterprise modelling / Software engineering / Process management / Threat / Software development / Business process modeling

Experiences Threat Modeling at Microsoft Adam Shostack Microsoft Abstract. Describes a decade of experience threat modeling products

Add to Reading List

Source URL: adam.shostack.org

Language: English - Date: 2014-06-11 12:01:57
696Crime prevention / Cryptography / Information governance / National security / Computer security / Covert channel / Information flow / Program slicing / Mandatory access control / Alloy Analyzer / Domain-specific language / Information security

A Security Domain Model for Static Analysis and Verification of Software Programs Alan B. Shaffer Naval Postgraduate School Computer Science Dept Monterey, CA, USA

Add to Reading List

Source URL: cisr.nps.edu

Language: English - Date: 2008-08-18 13:41:06
697Computing / Software / Network management / Scripting languages / Iptables / Computer network security / Event correlation / Firewall / Regular expression / Parsing / Complex event processing / Perl

Paper Title (use style: paper title)

Add to Reading List

Source URL: ristov.github.io

Language: English - Date: 2016-03-01 13:52:01
698Software / System software / Utility software / Computer network security / Intrusion detection systems / Wireless networking / Deep packet capture / Computer security / Snort / Packet analyzer / Suricata / Wireshark

Kernel packet capture technologies Éric Leblond Stamus Networks October 1, 2015

Add to Reading List

Source URL: home.regit.org

Language: English - Date: 2015-10-01 09:35:59
699Software testing / Computing / Codenomicon / Technology / Security / Computer network security / Medical technology

Codenomicon-AppCheck-Symbol-Lock

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
700IPsec / Cryptographic protocols / Virtual private networks / Computer network security / Cryptographic software / StrongSwan / Internet Key Exchange / FreeS/WAN / Security association / Openswan

strongSwan VPNs scalable and modularized! Andreas Steffen Copyright © 2008 by Andreas Steffen

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2008-05-05 12:09:19
UPDATE