Computer security software

Results: 11097



#Item
871Information technology management / Document management system / Information security / Public safety / Computing / Computer security / Security / Data loss prevention software

Integration with Data Loss Prevention (DLP) Controlled Document Collaboration with DLP Remediation and Discovery

Add to Reading List

Source URL: info.watchdox.com

Language: English - Date: 2015-07-18 21:16:44
872Software testing / Software quality / Computer network security / Hacking / Vulnerability / Software assurance / Veracode / CWE / Common Vulnerabilities and Exposures / Computer security / Cyberwarfare / Computing

Microsoft Word - BeingExplicit_WP.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-02 14:11:15
873Computer security / Intrusion detection system / Sguil / Snort / Intrusion prevention system / OSSIM / Suricata / Computer network security / System software / Software

INTRUSION DETECTION About the Course Knowledge Transfer

Add to Reading List

Source URL: www.silensec.com

Language: English - Date: 2014-04-29 06:18:44
874Malware / Computing / Symantec / Norton AntiVirus / Antivirus software / Software / Computer security

CASE STUDY HEALTHCARE INDUSTRY The Company

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2015-04-17 01:22:12
875Software-defined radio / Computer security / Crime prevention / National security / Videotelephony / 3GPP Long Term Evolution / 3GPP / 4G / GSM / Technology / Security / Mobile technology

Security Architectures of Mobile Systems Valtteri Niemi University of Helsinki AMICT’2015 Petrozavodsk, 13 May

Add to Reading List

Source URL: www.cs.karelia.ru

Language: English - Date: 2015-06-04 10:39:11
876Computer network security / IEEE 802 / Computer networking / Packet Processing / Deep packet inspection / Quality of service / Cloud computing / WiMAX / System Architecture Evolution / System software / Computing / Electronic engineering

White Paper Virtualisation in Telecoms Networks Intel® Architecture Processors Networking and Communications Realising the Benefits of Network

Add to Reading List

Source URL: www.intel.it

Language: English - Date: 2014-03-04 14:05:00
877Computer network security / Open Source Tripwire / Computer security / GTK+ / Wireless networking / Rootkit / Wireshark / Pcap / Malware / Software / System software / Computing

Chapter 10 Analysis of a Suspect Program: Linux Solutions in this chapter:

Add to Reading List

Source URL: scitechconnect.elsevier.com

Language: English - Date: 2015-03-19 08:13:16
878Computer security / ESET NOD32 / Clam AntiVirus / Avast! / Qihoo / Vba32 AntiVirus / Agnitum / ESET / Antivirus software / Software / System software

wsusoffline941_virustotal

Add to Reading List

Source URL: download.wsusoffline.net

Language: English - Date: 2014-09-30 11:37:02
879Software / Bitcoin / Peer-to-peer computing / Proof-of-work system / Ticket / Public-key cryptography / T puzzle / Consensus / Terahash / Cryptography / Computing / Computer network security

PREPRINT: Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions Andrew Miller, Elaine Shi, Ahmed Kosba, and Jonathan Katz University of Maryland, College Park {amiller,elaine,akosba,jkatz}@cs.umd.e

Add to Reading List

Source URL: cs.umd.edu

Language: English - Date: 2015-02-28 16:56:18
880Malware / Computer network security / Security / Rootkit / Computer virus / Analysis / Threat / Computer security / Cyberwarfare / Antivirus software

Paper Title (use style: paper title)

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:23
UPDATE