Computer security software

Results: 11097



#Item
861Computer memory / Common Criteria / Evaluation / Software / Protection Profile / Smart card / Flash memory / Proprietary software / Central processing unit / ISO standards / Computing / Software licenses

Security IC Platform PP with packages

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2014-08-25 01:47:51
862Computer network security / Intrusion detection systems / OSSEC / Computer security / Daniel B. Cid / Rootkit / Snort / Log analysis / Security log / System software / Software / Computing

Log Analysis using OSSEC Daniel B. Cid Copyright 2007 Daniel B. Cid

Add to Reading List

Source URL: ossec.net

Language: English - Date: 2012-06-29 13:37:34
863Security / Software / Industrial automation / SCADA / Telemetry / Computer security / Server / Computer emergency response team / Antivirus software / Technology / Computer network security

Cybersecurity on SCADA: risk prediction, analysis and reaction tools for Critical Infrastructures Service and tool developed and operated by : AVCaesar

Add to Reading List

Source URL: www.cockpitci.eu

Language: English - Date: 2014-03-28 18:11:02
864Computing / Federated identity / Security Assertion Markup Language / Single sign-on / Lightweight Directory Access Protocol / SAML 2.0 / Identity management / System software / Computer security

eMediaVA Single Sign-On The key to solving at least one of your problems New digital applications are changing the way we teach and learn, but managing them can quickly become a burden for busy administrators and IT

Add to Reading List

Source URL: education.whro.org

Language: English - Date: 2015-04-20 14:21:24
865Human–computer interaction / Visual arts / Usability / Web development / Software architecture / User interface design / Telogis Inc. / User experience design / Web application / Design / Web design / Software development

CV for Nathanael Coyne Personal Details Name: Mr Nathanael Coyne (Boehm) Date of Birth: 18 July 1983 Citizenship: Australian Security Clearance: Lapsed

Add to Reading List

Source URL: www.purecaffeine.com

Language: English - Date: 2015-05-01 01:07:12
866Kerberos / PostgreSQL / Windows / Greenplum / Software / Computer network security / Computing

PRODUCT DOCUMENTATION Pivotal™ Greenplum Database® Version 4.3

Add to Reading List

Source URL: gpdb.docs.pivotal.io

Language: English - Date: 2015-07-09 14:07:42
867Wireless networking / Pcap / Computer networking / Packet analyzer / Netflow / Computer network / Network management / Computer network security / Software / Computing / System software

Microsoft PowerPoint - mnet_07_Measurements

Add to Reading List

Source URL: www.net.in.tum.de

Language: English - Date: 2010-12-17 04:04:23
868Security / Software testing / Hacking / Vulnerability / CVSS / Security testing / Buffer overflow / Attack / Uncontrolled format string / Cyberwarfare / Computer security / Computer network security

Microsoft Word - unforgivable 3.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-09-13 16:51:18
869Shellcode / Malware / Software bugs / Hooking / Polymorphic code / Windows API / Code injection / Exploit / Application programming interface / Cyberwarfare / Computer security / Computing

Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian Monrose

Add to Reading List

Source URL: wwwx.cs.unc.edu

Language: English - Date: 2014-09-05 15:38:44
870Evaluation / Common Criteria / Evaluation Assurance Level / Red Hat Enterprise Linux / Security Target / Protection Profile / Linux kernel / Linux / Red Hat / Computer security / Computing / Software

Microsoft Word - HP_RHEL4_security_target-v2.4.doc

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
UPDATE