Computer security software

Results: 11097



#Item
971X86 architecture / MOV / X86 / JMP / Sandbox / NOP / CPUID / X86 assembly language / Computer architecture / X86 instructions / Machine code

Sandboxing: Software Fault Isolation  Scenarios for Sandboxing  • Web Browser Plug‐ins  o Security hole in plug‐in compromises browser  o Impose restrictions on plug‐in  • Downloaded execut

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42
972Federated identity / Single sign-on / HTTP cookie / Access token / Central Authentication Service / Identity management / Computer security / System software / Computing

Implementation Guide Introduction This guide discusses the process and key topics involved in launching a video site on the Waywire platform.

Add to Reading List

Source URL: enterprise.waywire.com

Language: English - Date: 2015-03-16 15:20:36
973Subroutines / Control flow / Cross-platform software / JavaScript / Callback / Stub / Serialization / Eval / Computing / Software engineering / Computer programming

Pivot: Fast, Synchronous Mashup Isolation Using Generator Chains James Mickens Microsoft Research Abstract—Pivot is a new JavaScript isolation framework for

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-21 13:48:10
974Software testing / Technology / Hacking / Vulnerability / Smart card / Common Criteria / Reverse engineering / ISO standards / Computer security / Cyberwarfare

Joint Interpretation Library Application of Attack Potential to Smartcards Version 2.9 January 2013

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2013-02-14 10:20:23
975Internet / Computer networking / Network performance / Cross-platform software / Proxy server / Computer network security / X-Forwarded-For / Privoxy / Apache HTTP Server / Computing / Software / Internet privacy

Here Be Web Proxies Nicholas Weaver1 , Christian Kreibich2 , Martin Dam3 , and Vern Paxson4 1 ICSI / UC San Diego Aalborg University

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2014-03-11 02:14:19
976Computing / Public key certificate / Software / Windows / Microsoft Outlook / Computer architecture / Certificate policy / X.509 / Public-key cryptography / Key management / Revocation list

UNCLASSIFIED Report Number: C4-017R-01 Guide to Using DoD PKI Certificates in Outlook 2000 Security Evaluation Group

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2003-10-20 12:38:28
977Open content / Free software / Free software licenses / Copyleft / GNU Project / GNU General Public License / Mitre Corporation / Berkeley Software Distribution / Open source / Computer law / Law / Software licenses

2nd National Software Summit (NSS2) — The Software Industry Software Productivity Consortium - Reston, Virginia - April 27, 2004 The Software Industry and Economic Security 7HUU\%ROOLQJHU

Add to Reading List

Source URL: www.terrybollinger.com

Language: English - Date: 2005-06-19 01:45:28
978Internet / Cryptographic software / Transmission Control Protocol / Packet switching / Internet Protocol / Packet Processing / Anonymity / Degree of anonymity / Tor / Computer networking / Computing / Internet privacy

LAP: Lightweight Anonymity and Privacy

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2012-05-22 01:35:47
979Internet / Software / Cryptographic software / Tor / Block / IP blocking / Emirates Integrated Telecommunications Company / IP address / Internet privacy / Computer network security / Computing

Anonymity and Censorship Resistance Entry node Middle node Exit node

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2009-11-04 07:24:41
980Advanced persistent threat / Hacking / Malware / Computer virus / Vulnerability / Antivirus software / Cyberwarfare / Security / Computer security

Poster: OpenAPT – Open-Source Advanced Persistent Threat for Academic Research Mordehai Guri, Tom Sela, Yuval Elovici Department of Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva, Israel

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-05-17 10:01:48
UPDATE