Computer security software

Results: 11097



#Item
771Software engineering / Computing / Computer programming / Data types / Cross-platform software / Object-oriented programming languages / Procedural programming languages / C / Printf format string / Relational operator / Const / Type conversion

Mind your Language(s) A discussion about languages and security (Long Version) ´ Eric Jaeger, Olivier Levillain and Pierre Chifflier

Add to Reading List

Source URL: spw14.langsec.org

Language: English - Date: 2014-06-12 22:54:26
772Computing / Cyberwarfare / Computer security / Palamida / Hacking / Computer network security / Software testing / ASP.NET / Shellshock / Vulnerability

ENTERPRISE EDITION Datasheet ENTERPRISE EDITION AT A GLANCE An end-to-end system for

Add to Reading List

Source URL: www.palamida.com

Language: English - Date: 2015-06-17 16:42:29
773Computer network security / Identity theft / Rogue software / National security / ShmooCon / Spyware / Computer security / Sendmail / Stack

Towards Evidence-Based Security Adam Shostack ShmooCon ‘05 Slides at

Add to Reading List

Source URL: adam.shostack.org

Language: English - Date: 2014-06-11 11:48:53
774Security / Computer security / Software testing / Cyberwarfare / Codenomicon / Computer network security / Cyber-attack

Codenomicon-AppCheck-Symbol-Lock

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:12
775Computing / Software engineering / Security / Data loss prevention software / Data security / Information technology / Hypertext Transfer Protocol / Computer security / JavaScript / World Wide Web / POST

DATA LEAKS Can Content-Based Data Loss Prevention Solutions Prevent Data Leakage in Web Traffic? David Gugelmann | ETH Zurich

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2015-08-18 10:57:52
776Network architecture / Computer network security / OpenFlow / Software-defined networking / Stateful firewall / Open vSwitch / Firewall / Controller

HotSwap: Correct and Efficient Controller Upgrades for Software-Defined Networks Laurent Vanbever Joshua Reich

Add to Reading List

Source URL: vanbever.eu

Language: English - Date: 2013-06-26 09:06:44
777Theoretical computer science / Formal methods / Computer science / Software engineering / Logic in computer science / Dependently typed programming / Proof assistants / Proof-carrying code / Formal verification / Mathematical proof / CurryHoward correspondence / Algorithm

The Weird Machines in Proof-Carrying Code IEEE Security and Privacy LangSec Workshop 2014 Invited paper Julien Vanegue Bloomberg L.P. New York, USA.

Add to Reading List

Source URL: openwall.info

Language: English - Date: 2014-10-13 00:40:06
778Remote desktop / Remote administration software / Computing / Software / Security / BIOS / Splashtop Remote / Splashtop / Remote desktop software / Computer network security / Secure communication / Health Insurance Portability and Accountability Act

How Splashtop Helps Support HIPAA Compliance March 2015 Splashtop Inc.

Add to Reading List

Source URL: d36wcsykcv5g5l.cloudfront.net

Language: English - Date: 2015-04-06 14:05:53
779Computing / Software / Computer architecture / Android / Smartphones / Alphabet Inc. / Intent / Mobile app / Google Play / Malware / Computer virus / Couple

On the Need of Precise Inter-App ICC Classification for Detecting Android Malware Collusions* Karim O. Elish, Danfeng (Daphne) Yao, and Barbara G. Ryder Department of Computer Science Virginia Tech Email: {kelish, danfen

Add to Reading List

Source URL: ieee-security.org

Language: English
780

Computer Security Course. Song Dawn Software Security (I):

Add to Reading List

Source URL: inst.eecs.berkeley.edu

Language: English - Date: 2015-02-09 16:40:51
    UPDATE