Computer security software

Results: 11097



#Item
901Computing / Programming language theory / Information flow / Information theory / Crime prevention / National security / Data-flow analysis / Static single assignment form / Computer security / Data types / Type theory / Software engineering

Enforcing information flow policies by a three-valued analysis Jos´ee Desharnais Erwanne P. Kanyabwero

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:10
902Computer security / System software / Federated identity management / Security Assertion Markup Language / OpenID / Identity management system / Windows CardSpace / Digital identity / Identity provider / Identity management / Identity / Federated identity

Achieving Privacy in a Federated Identity Management System Susan Landau, Hubert Le Van Gong Sun Microsystems Laboratories Robin Wilton

Add to Reading List

Source URL: www.ifca.ai

Language: English - Date: 2009-03-05 11:10:54
903Computer network security / IEEE 802 / Computer networking / Packet Processing / Deep packet inspection / Quality of service / Cloud computing / WiMAX / System Architecture Evolution / System software / Computing / Electronic engineering

White Paper Virtualisation in Telecoms Networks Intel® Architecture Processors Networking and Communications Realising the Benefits of Network

Add to Reading List

Source URL: www.intel.nl

Language: English - Date: 2014-03-02 05:22:49
904HTTP / Secure communication / Cryptographic protocols / Electronic commerce / Portable software / HTTP Secure / HTTP Strict Transport Security / Transport Layer Security / Man-in-the-middle attack / Software / Computing / Cryptography

Poster: Man-in-the-Browser-Cache: Persisting HTTPS Attacks via Browser Cache Poisoning Yaoqi Jia∗ , Yue Chen‡ , Xinshu Dong† , Prateek Saxena∗ , Jian Mao‡ , Zhenkai Liang∗ ∗ Department of Computer Science,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:31
905Software testing / Software bugs / Hacking / Source code / Vulnerability / Attack patterns / Application security / Cross-site scripting / Code injection / Cyberwarfare / Computer security / Computing

Microsoft Word - tcm_taxonomy_submission.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:23
906Security / Hacking / Software testing / Internet of Things / Vulnerability / Attack / Internet / Computer network security / Cyberwarfare / Computer security

IoT and M2M Opportunity Matthew Johnson CTO Guardtime Gartner definition:

Add to Reading List

Source URL: industry40.ee

Language: English - Date: 2015-05-15 05:46:47
907Kerberos / Microsoft Excel / Software / Computing / Computer network security

Release Notes for GRANTA MI Version 7 Update 4, November 2014

Add to Reading List

Source URL: www.grantadesign.com

Language: English - Date: 2014-11-25 06:39:49
908Computer network security / IEEE 802 / Computer networking / Packet Processing / Deep packet inspection / Quality of service / Cloud computing / WiMAX / System Architecture Evolution / System software / Computing / Electronic engineering

White Paper Virtualisation in Telecoms Networks Intel® Architecture Processors Networking and Communications Realising the Benefits of Network

Add to Reading List

Source URL: www.intel.eu

Language: English - Date: 2014-03-03 12:50:49
909Cross-platform software / Computer security / Code injection / Machine code / Malware / Vulnerability scanner / Nmap / National Vulnerability Database / Ping / Software / Computing / System software

Basic Web Security About Me • Working with Web Developer Since 1996
 • Working with Unix (FreeBSD, Linux) System Admin Since 1996

Add to Reading List

Source URL: ton.packetlove.com

Language: English
910Computer security / Antivirus software / Malware / Payment Card Industry Data Security Standard / Computer virus / Spyware / Rootkit / Unified threat management / Espionage / Computer network security / Cyberwarfare

CYLANCEPROTECT + App Control What is AppControl? Traditional antivirus products use a blacklisting approach that allows all applications to run unless they are known to be malicious or exhibit known bad behaviors. Applic

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2015-05-05 12:00:46
UPDATE