Computer security software

Results: 11097



#Item
781Espionage / Computer security / Cyberwarfare / Computer network security / Trojan horses / Identity theft / Rogue software / Spyware / Morgan Marquis-Boire / Hacking Team / Proxy server / Citizen Lab

Research Brief March 2014 The Citizen Lab Hacking Team’s US Nexus

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2015-03-18 14:57:24
782Software / Computing / Computer architecture / Smartphones / Android / Google Play / Vulnerability

On the Need of Precise Inter-App ICC Classification for Detecting Android Malware Collusions Karim O. Elish, Danfeng (Daphne) Yao, and Barbara G. Ryder

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-06-05 20:26:03
783Computing / Internet / Computer security / Internet security / Transport Layer Security / Software testing / Cryptographic software / Cryptographic protocols / Heartbleed / OpenSSL / Codenomicon / Vulnerability

Heartbleed_story_2014-09-24

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
784Computing / OpenFlow / Nox / Phillip Porras / Computer security / Software-defined networking

#SDN2012 Welcome! SDN Security Seminars 2012 #SDN2012 Agenda

Add to Reading List

Source URL: www.openflowsec.org

Language: English - Date: 2013-10-10 00:40:08
785Computing / Software / System software / Computer network security / Parallel computing / Intrusion detection systems / Computer security / Deep packet inspection / Network processor / Internet protocol suite / Bro / Transmission Control Protocol

Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson,1 K. Asanovi´c,2 S. Dharmapurikar,3 J. Lockwood,4 R. Pang,5 R. Sommer,1 N. Weaver1 Abstract The performance pressures on implementing e

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:02
786

Computer Security Course. Song Dawn Software Security (II):

Add to Reading List

Source URL: inst.eecs.berkeley.edu

- Date: 2015-02-09 16:40:51
    787Cryptography / Tokenization / Software engineering / Computer programming / Computing / Lexical analysis / Token / Search engine indexing / Security token / Payment processor / Payment card number / Naming convention

    Guideline: Tokenization Product Security Guidelines Version: 1.0 Date:

    Add to Reading List

    Source URL: www.pcisecuritystandards.org

    Language: English - Date: 2015-04-02 02:17:56
    788Actuarial science / Computer security / Security / Software maintenance / Computer network security / Patch / Vulnerability / Risk / Computer worm / Attack / Patch Tuesday / SAINT

    VOLUME THREE · ISSUE TWO Secure Business Quarterly: Defining the Value of Strategic Security ILLUSTRATION: JUD GUITTEAU

    Add to Reading List

    Source URL: adam.shostack.org

    Language: English - Date: 2014-06-11 12:01:38
    789Computing / Network architecture / Computer network security / OpenFlow / Cyberwarfare / OSI protocols / Transmission Control Protocol / Software-defined networking / SYN cookies / Denial-of-service attack / Data link layer / Forwarding plane

    AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks Seungwon Shin† † Vinod Yegneswaran‡

    Add to Reading List

    Source URL: faculty.cse.tamu.edu

    Language: English - Date: 2013-08-28 15:18:02
    790Software / Computing / Computer security / Computer network security / Software testing / Penetration test / Application security / Vulnerability assessment / W3af / Security testing / Metasploit Project / Vulnerability

    International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, NovemberAN OVERVIEW OF PENETRATION TESTING 1 Aileen G. Bacudio, 1Xiaohong Yuan, 2Bei-Tseng Bill Chu, 1Monique Jones

    Add to Reading List

    Source URL: airccse.org

    Language: English - Date: 2011-11-30 01:55:07
    UPDATE