Computer security software

Results: 11097



#Item
721Security / Prevention / Computer security / Crime prevention / Cryptography / Information governance / National security / Codenomicon / Software testing / Cert / Information security / AbuseHelper

CERT-FI & Abuse Situation Awareness Case Study BACKGROUND CERT-FI is the Finnish national computer security incident response team whose task is to promote security in the information

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
722Educational software / Learning management systems / Computer access control / Password / Security / Login / Email / Educational technology / Outlook.com

Learning Management System User Guide Version 4.0 | Updated CCU User Guide: LMS

Add to Reading List

Source URL: hbexmail.blob.core.windows.net

Language: English - Date: 2016-01-19 15:08:41
723Software / Computing / Cross-platform software / Data management / Blog software / Drupal / Oracle Database / SQL injection / Database / Computer security / MySQL / Connection pool

Diesel: Applying Privilege Separation to Database Access Adrienne Porter Felt Matthew Finifter UC Berkeley

Add to Reading List

Source URL: webblaze.cs.berkeley.edu

Language: English - Date: 2014-11-17 18:57:29
724Computing / Network architecture / Computer network security / Emerging technologies / Network protocols / OpenFlow / Middlebox / Software-defined networking / Engineering / Computer network / Provisioning / Technology

A Slick Control Plane for Network Middleboxes Bilal Anwer Theophilus Benson Georgia Tech

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2013-07-08 16:07:10
725Computing / Computer security / Cyberwarfare / Hacking / Software testing / Vulnerability / SQL injection / Transport Layer Security / Dynamic SSL

http://www.sektioneins.de Security Problems in Web Applications except Injection Vulnerabilities Stefan Esser <> Ben Fuhrmannek <>

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2011-02-06 15:51:10
726Computer network security / Cyberwarfare / Computer security / Salvatore J. Stolfo / Cryptography / Intrusion detection system / Decoy / Network security / Rootkit / Malware / Computer virus / Antivirus software

Insider Threats Designing Host and Network Sensors to Mitigate the Insider Threat Insider attacks—that is, attacks by users with privileged

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:35
727Computing / Cyberwarfare / Software engineering / Hacking / Software testing / SQL / Computer security / Data management / SQL injection / Vulnerability / Data-flow analysis / Denial-of-service attack

Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications Daniele Gallingani Rigel Gjomemo, V.N. Venkatakrishnan

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-20 23:58:55
728Computing / Cryptography / IPsec / Network architecture / Cryptographic protocols / Computer network security / Virtual private networks / Cryptographic software / Internet Key Exchange / StrongSwan / Opportunistic encryption / NAT traversal

strongSwan The new IKEv2 VPN Solution Andreas Steffen Copyright © 2007 by Andreas Steffen

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2007-05-26 10:12:50
729Software / Computer access control / Computer security / Cryptographic software / Identity management / Hacking / Password manager / Password / Keychain / Cross-site scripting / Clickjacking / Crypt

Protecting Users Against XSS-based Password Manager Abuse Ben Stock Martin Johns

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English
730Computer security / Software / Cyberwarfare / Antivirus software / Malware / Rootkits / Computer network security / Kaspersky Lab / Duqu / Kaspersky Anti-Virus / Duke

THE DUKES 7 years of Russian cyberespionage TLP: WHITE This whitepaper explores the tools - such as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, etc- of the Dukes, a well-resourced, highly

Add to Reading List

Source URL: www.f-secure.com

Language: English - Date: 2015-09-17 01:34:34
UPDATE