Computer security software

Results: 11097



#Item
821Software bugs / Computer errors / Debuggers / GNU Debugger / Shellcode / Python / Stack buffer overflow / Buffer overflow / .py / Computing / Software / Computer programming

EECS 388 Intro to Computer Security October 24, 2014 Project 4: Application Security

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2014-12-24 15:06:41
822Computer security / Buffer overflow / Heap overflow / Circular buffer / Integer overflow / Vulnerability / Code injection / Pointer / Stack overflow / Computing / Software bugs / Cyberwarfare

Microsoft Word - CWEs_as_vuln_theory.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-18 14:25:17
823Cyberwarfare / Nuclear program of Iran / Rootkits / Stuxnet / WinCC / Dynamic-link library / SCADA / Computer virus / VirusBlokAda / System software / Computing / Technology

Security Response W32.Stuxnet Dossier Version 1.1 (OctoberNicolas Falliere, Liam O Murchu,

Add to Reading List

Source URL: www.cockpitci.eu

Language: English - Date: 2012-04-13 09:44:02
824Computability theory / Theory of computation / Models of computation / Turing machine / Markup languages / Parsing / Halting problem / Software bug / Programming language / Theoretical computer science / Computer science / Computing

SYSTEMS SECURITY Editors: Patrick McDaniel, | Sean W. Smith, Beyond Planted Bugs in “Trusting Trust” The Input-Processing Frontier Sergey Bratus, Trey Darley, Michael Locasto

Add to Reading List

Source URL: langsec.org

Language: English - Date: 2014-04-02 21:43:44
825Computer network security / Software testing / National security / Secure communication / Vulnerability / Application security / Software bug / Threat / Cross-site scripting / Cyberwarfare / Computer security / Security

A Software Flaw Taxonomy: Aiming Tools At Security Sam Weber Paul A. Karger Amit Paradkar (samweber|karger|paradkar)@watson.ibm.com IBM Research Division

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:13
826Cyberwarfare / Concurrency control / Software testing / Lock / OWASP / Vulnerability / Application security / Deadlock / Computing / Computer security / Threads

CONCURRENCY VULNERABILITIES OWASP BOOKS OWASP Testing Guide : ~NZ$18 + pp

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:29
827Provisioning / System software / Software / Computing / Network management / Computer network security / PacketFence

MobileIron�Quick�Integration�Guide for�PacketFence�version�5.0.0 MobileIron�Quick�Integration�Guide by�Inverse�Inc.

Add to Reading List

Source URL: www.packetfence.org

Language: English - Date: 2015-04-16 09:14:37
828Identity management / Federated identity / Identity / Single sign-on / Security Assertion Markup Language / Active Directory Federation Services / SAML 2.0 / Federated identity management / Password fatigue / System software / Computer security / Identity management systems

C OD E42 T E C HN O LO GY N OT E Single Sign-On Increases IT security, decreases password fatigue and simplifies

Add to Reading List

Source URL: essentials.code42.com

Language: English - Date: 2015-07-18 10:50:12
829Cryptography / Password / One-time password / IPhone / Software token / Security token / Two-factor authentication / Security / Access control / Computer security

User Guide Soft Token on your mobile Page 1 of 7 FransiKey

Add to Reading List

Source URL: www.alfransi.com.sa

Language: English - Date: 2014-04-16 04:49:09
830Computer network security / Software testing / Hacking / Vulnerability / Validation / Computer security / Cyberwarfare / Security

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2011-12-21 03:32:12
UPDATE