Computer security software

Results: 11097



#Item
801Cryptography / Computing / Software / Security / Computer security / Password / Internet privacy / Public-key cryptography / Web application / Data Protection API / Dynamic SSL

Private Use of Untrusted Web Servers via Opportunistic Encryption

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:03
802Computer security / Evaluation / Security / Crime prevention / Software quality / Data security / Evaluation Assurance Level / Common Criteria / Software assurance / Protection Profile / Validation / National Information Assurance Partnership

Sumeet.Malhotra.Software Assurance Challenges for Systems Integrators.ppt

Add to Reading List

Source URL: swa.omg.org

Language: English - Date: 2006-12-14 08:55:14
803Software / Computer security / System software / Computer network security / Software testing / Metasploit Project / Hacking / Exploit / Script kiddie

Metasploit 3.0 Metasploit 3.0: The Middle of the End of the End of the Middle? by Aaron Grothe, CISSP, NSA IAM/IEM, Security+

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2008-05-16 20:02:08
804Computer network security / Cyberwarfare / Computer security / Network management / Zotob / Sasser / Antivirus software / Threat / Firewall / Computer virus

Is Your Network a Sitting Duck? 3 Secrets to Securing Your Information Systems Presenter: Matt Harkrider Founder, Alert Logic Who We Are: Corporate Fact Sheet

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2008-05-16 20:02:08
805Computing / Internet / Software / Internet privacy / Computer networking / Internet protocols / Network performance / Proxy server / Reverse proxy / Transport Layer Security / Cryptographic hash function / Load balancing

Validating Web Content with Senser Jordan Wilberding Georgetown University Andrew Yates Georgetown University

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2013-10-29 13:52:26
806Software testing / Hacking / Vulnerability / Printf format string / Computing / Competitiveness / Computer security / Economy

Jim.Butler.LessonsLearnedStaticAnalysisTools_OMG-SwASIG_061207.ppt

Add to Reading List

Source URL: swa.omg.org

Language: English - Date: 2006-12-14 08:55:18
807Software testing / Computer security / Computing / Economy / Payment Card Industry Data Security Standard / PA-DSS / Penetration test / Black-box testing / Vulnerability / Gray box testing / White-box testing / Application security

Standard: PCI Data Security Standard (PCI DSS) Version: 1.0 Date:

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2015-04-08 11:48:31
808Computer security / Cyberwarfare / Computing / Computer network security / Antivirus software / Malware / Lastline / Intrusion detection system / Advanced persistent threat / Rootkit / Duqu / Computer virus

Technical Report of MRG Effitas and CrySyS Lab An independent test of APT attack detection appliances Gábor Ács -Kurucz 1, Zoltán Balázs 2, Boldizsár Bencsáth 1 , Levente Buttyán 1 , Roland Kamarás 1 , Gábor Mo

Add to Reading List

Source URL: blog.mrg-effitas.com

Language: English - Date: 2014-12-03 11:48:39
809Risk analysis / Finance / Money / Computer security / Risk / Financial risk / Risk factor / Investment / Actuarial science

MediaSCORE and MediaRIVERS Media Preservation Prioritization Software User Guide Guide created by: Allison Bohm

Add to Reading List

Source URL: www.avpreserve.com

Language: English - Date: 2015-03-14 19:29:25
810Computing / Software / Computer architecture / Computing platforms / Smartphones / Alphabet Inc. / Android / Intent / Microsoft App-V

Android Application Security Assessments By Michael Born © 2014 Solutionary, Inc.

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2014-03-19 23:26:27
UPDATE