Computer security software

Results: 11097



#Item
951Oracle Corporation / Oracle Database / Leakage / Computer security / Information leakage / Software / Security / Electrical engineering

Precise Enforcement of Progress-Sensitive Security Scott Moore, Aslan Askarov, and Stephen Chong Harvard School of Engineering and Applied Science {sdmoore,aslan,chong}@seas.harvard.edu Abstract Program progress (or term

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:11
952Mandatory access control / Access Control Matrix / Role-based access control / XACML / Filesystem permissions / Authorization / Discretionary access control / Mandatory Integrity Control / Security-Enhanced Linux / Computer security / Security / Access control

Delft University of Technology Software Engineering Research Group Technical Report Series Declarative Access Control for WebDSL: Combining Language Integration and

Add to Reading List

Source URL: swerl.tudelft.nl

Language: English - Date: 2008-04-25 16:21:05
953Rogue software / Spyware / Social engineering / Chaos Computer Club / Trojan horse / Internet privacy / Rogue security software / Antivirus software / Malware / Espionage / System software

Microsoft Wordstate-trojans.docx

Add to Reading List

Source URL: www.statewatch.org

Language: English - Date: 2012-08-05 06:31:35
954BoKS / Directory services / Cryptographic software / Computer network security / Internet protocols / Internet standards / System software / Software / Computing

SPECIFICATION PROFILE BOKS SERVERCONTROL Fox Technologies, Inc. | www.foxt.com | |

Add to Reading List

Source URL: www.foxt.com

Language: English - Date: 2015-05-01 09:55:49
955Cybercrime / Science / Antivirus software / DShield / Malware / Blacklist / Whitelist / Phishing / DNSBL / Spamming / Computer security / Computing

To appear in Usenix Security, AugustHighly Predictive Blacklisting Jian Zhang

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2008-05-20 23:18:29
956Computing / Software testing / Electronic commerce / Hacking / SecurityMetrics / Penetration test / Vulnerability / Application security / Attack / Computer security / Cyberwarfare / Computer network security

SecurityMetrics Penetration Testing How do you really know if your sensitive data is secure? Even the best developers can accidentally miss secure coding steps, or fail to implement the latest secure coding practices.

Add to Reading List

Source URL: www.securitymetrics.com

Language: English - Date: 2015-07-14 12:51:45
957

Christian Grothoff FSEM 1111 Computer Security – from a Free Software Perspective Christian Grothoff

Add to Reading List

Source URL: grothoff.org

- Date: 2011-06-21 07:45:42
    958

    Security advies: Netwerkreglement Thuis op jouw computer maak je gebruik van programma’s, waarbij je tijdens de installatie altijd akkoord moet gaan met regels/voorwaarden waaronder je de software mag gebruiken (licent

    Add to Reading List

    Source URL: redactie.wageningenur.nl

    - Date: 2014-03-12 07:53:24
      959

      Christian Grothoff FSEM 1111 Computer Security – from a Free Software Perspective Christian Grothoff

      Add to Reading List

      Source URL: grothoff.org

      - Date: 2011-06-21 07:45:42
        960

        Christian Grothoff FSEM 1111 Computer Security – from a Free Software Perspective Christian Grothoff

        Add to Reading List

        Source URL: grothoff.org

        Language: English - Date: 2011-06-21 07:45:42
          UPDATE