Computer security software

Results: 11097



#Item
921Public-key cryptography / Computer security / Antivirus software / Phishing / Whitelist / Blacklist / Public key certificate / Certificate authority / HTTP Secure / Cryptography / Spamming / Key management

C:/Users/zhdong/Dropbox/Papers/ACSAC Poster/Certs_file.dvi

Add to Reading List

Source URL: www.ljean.com

Language: English - Date: 2015-01-23 15:36:26
922Backup / Data security / Windows Explorer / File system / Vault / Computer file / File format / Metadata / WinFS / System software / Computing / Software

Alibre Design 2012 © 2011 Alibre Design © 2011 Information in this document is subject to change w ithout notice. The softw are described in this document is

Add to Reading List

Source URL: www.bright-ideas.dk

Language: English - Date: 2012-04-27 09:42:10
923Kernel / Thread / Scheduler activations / System call / Ring / Linux kernel / Asynchronous I/O / End-to-end principle / Microkernel / Computer architecture / Computing / System software

System design issues • Systems often have many goals: - Performance, reliability, availability, consistency, scalability, security, versatility, modularity/simplicity • Designers face trade-offs:

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2006-12-07 12:00:26
924Data loss prevention software / Spam filtering / Universal Serial Bus / Internet / Technology / Computer security / Email / Computing

InterGuard - DATA LOSS PREVENTION Data Loss Prevention InterGuard’s patented technology blocks confidential data from leaving the organization via email, email attachments or USB devices such as flash memory sticks. I

Add to Reading List

Source URL: www.adm-tools.com

Language: English - Date: 2015-03-19 10:55:06
925System software / Identity / Federated identity / Security Assertion Markup Language / Shibboleth / SAML 2.0 / Service provider / Federated identity management / Public key certificate / Identity management systems / Identity management / Computer security

KALMAR UNION, FEDERATIONS A CONFEDERATION

Add to Reading List

Source URL: wayf.dk

Language: English - Date: 2012-04-24 07:15:37
926Computer programming / Buffer overflow protection / Stack buffer overflow / Buffer overflow / Stack / C standard library / Pointer / C / Subroutine / Computing / Software bugs / Software engineering

The following paper was originally published in the Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Atta

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2002-04-30 18:05:07
927Applied mathematics / Formal verification / Specification / Theoretical computer science / Evaluation / Formal methods / Software bug / Parsing

LangSec: Recognition, Validation, and Compositional Correctness for Real World Security Mission Statement. Language-theoretic security (LangSec) is a design and programming philosophy that focuses on formally correct and

Add to Reading List

Source URL: langsec.org

Language: English - Date: 2014-12-19 03:59:22
928Software / Common Criteria / Mandatory access control / National Information Assurance Partnership / Evaluation Assurance Level / Linux kernel / Security-Enhanced Linux / Linux / Protection Profile / Computer security / Evaluation / Computing

National Information Assurance Partnership ® TM

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
929Embedded Linux / Smartphones / Firewall / ESET / Internet privacy / Software / Computing / Computer network security / Android

Cyber Hygiene Doing your part to stay safer online. TOP TEN PERSONAL COMPUTER SAFETY TIPS

Add to Reading List

Source URL: securingourecity.org

Language: English - Date: 2015-05-25 02:22:28
930Software testing / Hacking / Relational database management systems / Database management systems / Attack patterns / SQL injection / Vulnerability / Code injection / Buffer overflow / Cyberwarfare / Computing / Computer security

CWECWE/SANS Top 25 Most Dangerous Software Errors

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2012-09-25 15:14:33
UPDATE