Computer security software

Results: 11097



#Item
851Security / Hacking / Software testing / National security / Vulnerability / Exploit / Attack / Threat / Zero-day attack / Computer network security / Cyberwarfare / Computer security

  Christian  Gehl   Co-­‐Founder    &  CEO     www.trifense.com  

Add to Reading List

Source URL: www.europa.brandenburg.de

Language: English - Date: 2012-06-20 09:00:08
852Cyberwarfare / Malware / Computer virus / Threat / Avira / Data mining / Antivirus software / Computer security / System software

CYLANCE INFINITY ENGINE Key Benefits 1. Game-changing malware detection - CylanceINFINITYENGINE identifies threats in Windows Portable Executables, PDFs, and Microsoft Office documents using predictive models which can c

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2015-05-01 19:03:47
853Software / Kaspersky Lab / Kaspersky Anti-Virus / Kaspersky Internet Security / Microsoft Windows / Computer virus / Kaspersky Mobile Security / NProtect GameGuard Personal / Antivirus software / System software / Computer security

How to Scan Computer in Safe Mode ? Immediately after you installed and updated Kaspersky Anti-Virus or Internet Security, if you feel your computer became slower than before, then it is due to the resident virus/malware

Add to Reading List

Source URL: www.cca.gov.np

Language: English - Date: 2014-06-01 07:04:18
854QEMU / Hyper-V / Hypervisor / Ring / Operating system / X86 / Xen / X Window System / System software / Software / Computer architecture

Poster: P ODA RCH: Protecting Legacy Applications with a Purely Hardware TCB Shweta Shinde1 , Shruti Tople1 , Deepak Kathayat2 , Prateek Saxena1 National University of Singapore1 , IIIT Hyderabad2 {shweta24, shruti90, pr

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:30
855Technology / Computer network security / Computer crimes / Rogue software / Spyware / Social engineering / Pharming / Dumpster diving / Phishing / Espionage / Malware / Cyberwarfare

Glossary of Common Terms This is a listing of some of the key words, concepts and slang used to describe identity crimes and the tools/techniques used by perpetrators. The language of identity crimes changes often as per

Add to Reading List

Source URL: www.theiacp.org

Language: English - Date: 2014-02-04 08:47:54
856Relational database management systems / Computer network security / Database management systems / Hacking / Software testing / SQL injection / Cross-site scripting / Vulnerability / Code injection / Computing / Cyberwarfare / Computer security

How to Secure Your Website 5th Edition Approaches to Improve Web Application and Website Security

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-07-09 23:13:11
857Computer architecture / Android / Mobile apps / IOS / App Store / Smartphones / Software / Computing

Support matrix Making the world safer, one app at a time. We provide a range of mobile app security solutions from scanning your app for

Add to Reading List

Source URL: www.riis.com

Language: English - Date: 2015-07-16 10:44:59
858Software / Spamming / Spam filtering / Anti-spam techniques / Simple Mail Transfer Protocol / Message transfer agent / Whitelist / Server / Internet Message Access Protocol / Email / Computing / Computer-mediated communication

Security and availability In cooperation with Denit and KPN Cyber Centre Hosting & Infrastructure The infrastructure of Carerix consist of database servers, application servers, webservers, mail servers, and various sub

Add to Reading List

Source URL: www.carerix.com

Language: English - Date: 2015-06-15 09:15:42
859Hacking / Capsicum / Capability-based security / Thread / Mandatory access control / Exception handling / Operating system / Vulnerability / C / Computing / Computer security / Software engineering

CS240 Operating Systems Midterm Exam Review – Feb. 8, 2013 Your Name: SUNet ID:

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2013-02-09 14:29:53
860Information technology management / Software / Computer security / Computer network security / Anomaly detection / Data mining / Intrusion detection system / Windows Registry / Malware / System software / Data security / Antivirus software

A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, and Krysta Svore {sal,fapap,eeskin,heller

Add to Reading List

Source URL: www.gatsby.ucl.ac.uk

Language: English - Date: 2006-10-19 19:27:44
UPDATE