Computer security software

Results: 11097



#Item
971Sandboxing: Software Fault Isolation  Scenarios for Sandboxing  • Web Browser Plug‐ins  o Security hole in plug‐in compromises browser  o Impose restrictions on plug‐in  • Downloaded execut

Sandboxing: Software Fault Isolation  Scenarios for Sandboxing  • Web Browser Plug‐ins  o Security hole in plug‐in compromises browser  o Impose restrictions on plug‐in  • Downloaded execut

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42
972Implementation Guide   Introduction This guide discusses the process and key topics involved in launching a video site on the Waywire platform.

Implementation Guide Introduction This guide discusses the process and key topics involved in launching a video site on the Waywire platform.

Add to Reading List

Source URL: enterprise.waywire.com

Language: English - Date: 2015-03-16 15:20:36
973Pivot: Fast, Synchronous Mashup Isolation Using Generator Chains James Mickens Microsoft Research   Abstract—Pivot is a new JavaScript isolation framework for

Pivot: Fast, Synchronous Mashup Isolation Using Generator Chains James Mickens Microsoft Research Abstract—Pivot is a new JavaScript isolation framework for

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-21 13:48:10
974Joint Interpretation Library  Application of Attack Potential to Smartcards Version 2.9 January 2013

Joint Interpretation Library Application of Attack Potential to Smartcards Version 2.9 January 2013

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2013-02-14 10:20:23
975Here Be Web Proxies Nicholas Weaver1 , Christian Kreibich2 , Martin Dam3 , and Vern Paxson4 1 ICSI / UC San Diego Aalborg University

Here Be Web Proxies Nicholas Weaver1 , Christian Kreibich2 , Martin Dam3 , and Vern Paxson4 1 ICSI / UC San Diego Aalborg University

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2014-03-11 02:14:19
976UNCLASSIFIED Report Number: C4-017R-01 Guide to Using DoD PKI Certificates in Outlook 2000 Security Evaluation Group

UNCLASSIFIED Report Number: C4-017R-01 Guide to Using DoD PKI Certificates in Outlook 2000 Security Evaluation Group

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2003-10-20 12:38:28
9772nd National Software Summit (NSS2) — The Software Industry Software Productivity Consortium - Reston, Virginia - April 27, 2004 The Software Industry and Economic Security 7HUU\%ROOLQJHU

2nd National Software Summit (NSS2) — The Software Industry Software Productivity Consortium - Reston, Virginia - April 27, 2004 The Software Industry and Economic Security 7HUU\%ROOLQJHU

Add to Reading List

Source URL: www.terrybollinger.com

Language: English - Date: 2005-06-19 01:45:28
978LAP: Lightweight Anonymity and Privacy

LAP: Lightweight Anonymity and Privacy

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2012-05-22 01:35:47
979Anonymity and Censorship Resistance  Entry node Middle node  Exit node

Anonymity and Censorship Resistance Entry node Middle node Exit node

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2009-11-04 07:24:41
980Poster: OpenAPT – Open-Source Advanced Persistent Threat for Academic Research Mordehai Guri, Tom Sela, Yuval Elovici Department of Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva, Israel

Poster: OpenAPT – Open-Source Advanced Persistent Threat for Academic Research Mordehai Guri, Tom Sela, Yuval Elovici Department of Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva, Israel

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-05-17 10:01:48