Computer security software

Results: 11097



#Item
961

Christian Grothoff FSEM 1111 Computer Security – from a Free Software Perspective Christian Grothoff

Add to Reading List

Source URL: grothoff.org

Language: English - Date: 2011-06-21 07:45:42
    962

    Christian Grothoff FSEM 1111 Computer Security – from a Free Software Perspective Christian Grothoff

    Add to Reading List

    Source URL: grothoff.org

    - Date: 2011-06-21 07:45:42
      963

      Christian Grothoff FSEM 1111 Computer Security – from a Free Software Perspective Christian Grothoff

      Add to Reading List

      Source URL: grothoff.org

      Language: English - Date: 2011-06-21 07:45:42
        964

        Christian Grothoff FSEM 1111 Computer Security – from a Free Software Perspective Christian Grothoff

        Add to Reading List

        Source URL: grothoff.org

        Language: English - Date: 2011-06-21 07:45:42
          965

          Christian Grothoff FSEM 1111 Computer Security – from a Free Software Perspective Christian Grothoff

          Add to Reading List

          Source URL: grothoff.org

          Language: English - Date: 2011-06-21 07:45:42
            966

            Christian Grothoff FSEM 1111 Computer Security – from a Free Software Perspective Christian Grothoff

            Add to Reading List

            Source URL: grothoff.org

            Language: English - Date: 2011-06-21 07:45:42
              967Netasq / Virtual appliance / Virtual private network / Virtual security appliance / Unified threat management / System software / Software / Computer network security

              NETASQ V50, V100, V200 & V500 VIRTUAL APPLIANCES FOR SMB AND NETWORK SEGMENTATION Small and medium businesses should bear in mind that all networks within their IT

              Add to Reading List

              Source URL: www.stormshield.eu

              Language: English - Date: 2014-07-04 03:54:51
              968Computer network security / Software testing / Hacking / Vulnerability / Application security / Code injection / Qualys / Web application security / Acunetix / Computer security / Cyberwarfare / Computing

              Vulnerability Factors in New Web Applications: Audit Tools, Developer Selection & Languages Jason Bau, Frank Wang, Elie Bursztein, Patrick Mutchler, John C. Mitchell Stanford University Abstract—We develop a web appli

              Add to Reading List

              Source URL: seclab.stanford.edu

              Language: English - Date: 2013-02-22 17:29:44
              969Security / Email authentication / Cryptographic software / Secure communication / Clipper chip / Disk encryption / National Security Agency / Pretty Good Privacy / Email encryption / Cryptography / Internet privacy / Computer security

              Bankston_short_biographical_summary

              Add to Reading List

              Source URL: static.newamerica.org

              Language: English - Date: 2015-05-04 13:25:41
              970Computer security / Cyberwarfare / Election technology / Electronic voting / Information society / Penetration test / Voting machine / Help America Vote Act / Ballot / Software testing / Politics / Elections

              Microsoft Word - Public red team report final-2.doc

              Add to Reading List

              Source URL: atsec.com

              Language: English - Date: 2012-12-03 15:18:06
              UPDATE