Computer security software

Results: 11097



#Item
881Cross-platform software / Freenet / Bitcoin / Plausible deniability / Peer-to-peer / Internet / Document / Software / Computing / Information technology audit

Poster: Incentivized Censorship Resistance with Payment Contracts Cecylia Bocovich, John A. Doucette, Ian Goldberg University of Waterloo, School of Computer Science {cbocovic, j3doucet, iang}@uwaterloo.ca Waterloo, Onta

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:31
882System software / Software / Virtual private networks / Internet privacy / OpenVPN / Network protocols / Secure Shell / Proxy server / OpenSSH / Computing / Computer network security / Tunneling protocols

ANONYPROZ SERVICE FEATURES UNLIMITED CONNECTIONS & SWITCHING BETWEEN HIGH PRIVACY OFFSHORE SERVERS AROUND THE GLOBE With Anonyproz OpenVPN service you get access to ALL our high speed USA, UK and high privacy servers wor

Add to Reading List

Source URL: www.anonyproz.com

Language: English - Date: 2012-08-07 14:07:03
883Vulnerability / Evaluation / Penetration test / Security testing / Validation / Framework Programmes for Research and Technological Development / Software testing / Computer security / Cyberwarfare

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2014-10-17 10:42:00
884Cross-platform software / Computer security / Computer network security / Penetration test / Software testing / KDE / BackTrack / Linux distribution / White hat / Hacking / Computing / Software

About the Course The majority of security and hacking tools used today by professional penetration testers and security auditors have been developed for the Unix/Linux environment. Therefore the ethical hacking professi

Add to Reading List

Source URL: www.silensec.com

Language: English - Date: 2014-04-29 06:17:24
885Software bugs / C Standard Library / Stack buffer overflow / Buffer overflow / Subroutines / Address space layout randomization / Return-to-libc attack / NX bit / Pointer / Computing / Software engineering / Computer programming

2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

Add to Reading List

Source URL: wwwx.cs.unc.edu

Language: English - Date: 2014-09-05 15:38:44
886USB / Access control / Wiegand / Magnetic stripe card / MIFARE / Universal Serial Bus / Security / Computer hardware / Card reader

SBR 0902 – USB Desktop Reader Compact Design for easy registration of proximity access cards in access control software. The card reader interface connects to a pc via USBand the required driver is automatically

Add to Reading List

Source URL: www.securityengineering.dk

Language: English - Date: 2015-01-26 15:33:01
887Password / Privileged Identity Management / Lieberman Software / Cryptography / Crypt / Privileged password management / Password strength / Security / Access control / Computer security

Microsoft Word - RPM Datasheet 2014.docx

Add to Reading List

Source URL: www.liebsoft.com

Language: English - Date: 2014-02-14 17:16:51
888PBKDF2 / Password manager / Password / Cryptographic software / Passphrase / Key management / Trusted Platform Module / Key stretching / Sticky Password Manager / Cryptography / Computer security / Security

“Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd.

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 15:32:02
889Cyberwarfare / Data security / Software testing / National security / Information security / Vulnerability / Information Systems Security Association / Application security / Business ethics / Security / Computer security / Computer network security

Ethics and Privacy ISSA Journal | October 2009 INSERT Ethics INTO Public Web App Testing By Michael Starks – ISSA member, Fort Worth, USA Chapter

Add to Reading List

Source URL: www.immutablesecurity.com

Language: English - Date: 2011-11-05 20:01:53
890Technology / Computing / Nanonetwork / Network architecture / Telecommunications / Key management / Public-key cryptography / Cryptography / Nanorobotics / Software / Nanotechnology / Emerging technologies

Towards Security in Nano-communication: Challenges and Opportunities Falko Dressler∗,a , Frank Karglb,c a Computer and Communication Systems, University of Innsbruck, Austria b Distributed Systems, University of Ulm, G

Add to Reading List

Source URL: eprints.eemcs.utwente.nl

Language: English - Date: 2013-01-06 11:36:19
UPDATE