Computer security software

Results: 11097



#Item
761Computing / Computer architecture / Software / Graphics hardware / Video cards / Hyper-V / Windows Server / General-purpose computing on graphics processing units / Graphics processing unit / Framebuffer / Hypervisor / Virtualization

Graphical User Interface for Virtualized Mobile Handsets Janis Danisevskis, Michael Peter, Jan Nordholz, Matthias Petschick and Julian Vetter Security in Telecommunications Technische Universit¨at Berlin Email: {janis,p

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-20 23:58:56
762Software / Computing / System software / Social networking services / File system permissions / Computer file / Facebook / Ls / Mobile security / Umask

Cognitive Disconnect: Understanding Facebook Connect Login Permissions Nicky Robinson Joseph Bonneau

Add to Reading List

Source URL: www.jbonneau.com

Language: English - Date: 2014-09-28 21:08:31
763Software / Computing / System software / Internet protocols / Network management / Computer network security / System administration / Internet Standards / Netfilter / Transmission Control Protocol / Port / Event correlation

Mano_Paul_Bookcover_Final

Add to Reading List

Source URL: ristov.github.io

Language: English - Date: 2016-03-01 13:52:01
764Software testing / Codenomicon / Computer security / Vulnerability / Software quality / FIPS 140-2 / SAINT

Defensics_FAQ_LATEST_25Sept14.indd

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
765Safety / Formal methods / Control engineering / Computer systems / Software quality / Session / Computer security / Embedded system / Life-critical system / Safety case / Systems engineering / Automobile safety

SAFECOMP 2015 Conference Programme September 23-25, 2015 TU Delft Congress Centre MekelwegCC Delft

Add to Reading List

Source URL: safecomp2015.tudelft.nl

Language: English - Date: 2015-09-15 06:05:36
766Cross-platform software / Computer network security / Java / Computer security / MySQL / ASP.NET / Nessus / Cracking of wireless networks

STANDARD EDITION Datasheet STANDARD EDITION AT A GLANCE A scan and analysis system for

Add to Reading List

Source URL: www.palamida.com

Language: English - Date: 2015-06-17 16:42:29
767Computing / Cryptography / Network architecture / Cryptographic protocols / Computer network security / IPsec / Internet protocols / Cryptographic software / StrongSwan / Internet Key Exchange / RADIUS / Online Certificate Status Protocol

Microsoft PowerPoint - LinuxTag2008_Flyer_VPN_Solution.ppt

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2008-06-25 02:51:57
768Computing / Network architecture / Computer network security / OpenFlow / Cyberwarfare / OSI protocols / Transmission Control Protocol / Software-defined networking / SYN cookies / Denial-of-service attack / Data link layer / Forwarding plane

AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks Seungwon Shin† † Vinod Yegneswaran‡

Add to Reading List

Source URL: www.openflowsec.org

Language: English - Date: 2013-10-15 15:03:15
769Network architecture / Computer network security / OpenFlow / Software-defined networking / Stateful firewall / Open vSwitch / Firewall / Controller

HotSwap: Correct and Efficient Controller Upgrades for Software-Defined Networks Laurent Vanbever Joshua Reich

Add to Reading List

Source URL: www.vanbever.eu

Language: English - Date: 2013-06-26 09:06:44
770Software testing / Codenomicon / Verification and validation / Validation / Computer security / Verification / Robustness testing / Vulnerability

CodeVerify A New Level of Security & Robustness Verification Codenomicon is the industry leader in bringing strength in visibility to connected systems and devices through a next-generation suite of tools and services th

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
UPDATE