Computer security software

Results: 11097



#Item
951Precise Enforcement of Progress-Sensitive Security Scott Moore, Aslan Askarov, and Stephen Chong Harvard School of Engineering and Applied Science {sdmoore,aslan,chong}@seas.harvard.edu Abstract Program progress (or term

Precise Enforcement of Progress-Sensitive Security Scott Moore, Aslan Askarov, and Stephen Chong Harvard School of Engineering and Applied Science {sdmoore,aslan,chong}@seas.harvard.edu Abstract Program progress (or term

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:11
952Delft University of Technology Software Engineering Research Group Technical Report Series Declarative Access Control for WebDSL: Combining Language Integration and

Delft University of Technology Software Engineering Research Group Technical Report Series Declarative Access Control for WebDSL: Combining Language Integration and

Add to Reading List

Source URL: swerl.tudelft.nl

Language: English - Date: 2008-04-25 16:21:05
953Microsoft Wordstate-trojans.docx

Microsoft Wordstate-trojans.docx

Add to Reading List

Source URL: www.statewatch.org

Language: English - Date: 2012-08-05 06:31:35
954SPECIFICATION PROFILE  BOKS SERVERCONTROL Fox Technologies, Inc. | www.foxt.com |  |

SPECIFICATION PROFILE BOKS SERVERCONTROL Fox Technologies, Inc. | www.foxt.com | |

Add to Reading List

Source URL: www.foxt.com

Language: English - Date: 2015-05-01 09:55:49
955To appear in Usenix Security, AugustHighly Predictive Blacklisting Jian Zhang

To appear in Usenix Security, AugustHighly Predictive Blacklisting Jian Zhang

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2008-05-20 23:18:29
956SecurityMetrics  Penetration Testing How do you really know if your sensitive data is secure? Even the best developers can accidentally miss secure coding steps, or fail to implement the latest secure coding practices.

SecurityMetrics Penetration Testing How do you really know if your sensitive data is secure? Even the best developers can accidentally miss secure coding steps, or fail to implement the latest secure coding practices.

Add to Reading List

Source URL: www.securitymetrics.com

Language: English - Date: 2015-07-14 12:51:45
957Christian Grothoff  FSEM 1111 Computer Security – from a Free Software Perspective Christian Grothoff

Christian Grothoff FSEM 1111 Computer Security – from a Free Software Perspective Christian Grothoff

Add to Reading List

Source URL: grothoff.org

- Date: 2011-06-21 07:45:42
    958Security advies: Netwerkreglement Thuis op jouw computer maak je gebruik van programma’s, waarbij je tijdens de installatie altijd akkoord moet gaan met regels/voorwaarden waaronder je de software mag gebruiken (licent

    Security advies: Netwerkreglement Thuis op jouw computer maak je gebruik van programma’s, waarbij je tijdens de installatie altijd akkoord moet gaan met regels/voorwaarden waaronder je de software mag gebruiken (licent

    Add to Reading List

    Source URL: redactie.wageningenur.nl

    - Date: 2014-03-12 07:53:24
      959Christian Grothoff  FSEM 1111 Computer Security – from a Free Software Perspective Christian Grothoff

      Christian Grothoff FSEM 1111 Computer Security – from a Free Software Perspective Christian Grothoff

      Add to Reading List

      Source URL: grothoff.org

      - Date: 2011-06-21 07:45:42
        960Christian Grothoff  FSEM 1111 Computer Security – from a Free Software Perspective Christian Grothoff

        Christian Grothoff FSEM 1111 Computer Security – from a Free Software Perspective Christian Grothoff

        Add to Reading List

        Source URL: grothoff.org

        Language: English - Date: 2011-06-21 07:45:42