Computer security software

Results: 11097



#Item
791Corporate governance / National Association of Corporate Directors / Internet privacy / Privacy / HTTP cookie / Medical privacy / Politics / Computing / Computer security

NACD’s SIMPLY SMARTER SYSTEM – PRIVACY POLICY This Privacy Policy covers the privacy practices that NACD employs when providing support, subscriptions, or software as a service (the "Services") to NACD clients throug

Add to Reading List

Source URL: mysimplysmarter.com

Language: English - Date: 2015-06-26 14:32:16
792Computer network security / Software testing / Computing / Computer security / Cyberwarfare / OWASP / Web application security / Application security / Black-box testing / Acceptance testing / Penetration test / Test automation

1 Testing Guide 4.0 Project Leaders: Matteo Meucci and Andrew Muller Creative Commons (CC) Attribution Share-Alike

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-09-24 14:15:00
793Security / Computer security / Identity management / Information technology management / Computer access control / Prevention / Access control / Provisioning / Business process management / User provisioning software / Aveksa

Fischer Identity™ Turn Identity Management into a Strategic Advantage Self-Service Portal

Add to Reading List

Source URL: www.fischerinternational.com

Language: English - Date: 2012-05-10 15:11:10
794Software quality / Quality assurance / Software assurance / Process management / IEEE standards / Management / Concept of operations / Vulnerability / Computer security / Critical infrastructure protection

Mitch.Komaroff.CONOPS Nov 06 Overview.ppt

Add to Reading List

Source URL: swa.omg.org

Language: English - Date: 2006-12-14 08:55:32
795Software / Microsoft Windows / Computer architecture / Internet Explorer / News aggregators / Windows Vista / Proprietary software / Internet Explorer 7 / Windows Server / Phishing / ActiveX / Windows CardSpace

IE Security: Past, Present, and Future

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:03
796Content-control software / Virtual communities / Internet privacy / Social networking services / Internet censorship circumvention / Internet security / Facebook / Reddit / Internet censorship / Internet Relay Chat

rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation Qiyan Wang Department of Computer Science University of Illinois at Urbana-Champaign

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2012-12-18 10:55:02
797Computer security / Computing / Security / Security Content Automation Protocol / Mitre Corporation / Computer network security / National security / Software quality / Extensible Configuration Checklist Description Format / Common Vulnerabilities and Exposures / Vulnerability / Open Vulnerability and Assessment Language

Standards in reporting Software Flaws: SCAP, CVE and CWE Robin A. Gandhi, Ph.D. University of Nebraska at Omaha (UNO) College of Information Science and Technology (IS&T) School of Interdisciplinary Informatics (Si2)

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2010-05-19 17:57:00
798Proxy servers / Computer network security / Cross-platform software / Browsing / Information science / Library science / Tor / Whonix / Open proxy / Linux

Paranoid Browsing By Aaron Grothe NEbraskaCERT 1

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2014-08-20 00:15:04
799Software / Computer security / System software / Antivirus software / ESET NOD32 / ESET / Comparison of antivirus software

Endpoint Protection Antivirus and Antispyware Eliminates all types of threats, including viruses, rootkits, worms and spyware Optional cloud-powered scanning:

Add to Reading List

Source URL: staging5.esetstatic.com

Language: English - Date: 2014-10-30 10:23:20
800Software / System software / Computing / System administration / Identity management / Windows Vista / Computer access control / Computer security / Runas / PowerShell / User Account Control / Keyfile

Bob McCoy Radio Engineering Industries, Inc.

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2013-02-16 09:25:54
UPDATE