Computer security

Results: 47159



#Item
991Business Team Busy Working Talking Concept

Business Team Busy Working Talking Concept

Add to Reading List

Source URL: spotfire.tibco.com

Language: English - Date: 2016-06-30 13:53:16
992PREVOTY APPLICATION SECURITY MONITOR AND PROTECT YOUR APPLICATIONS AT RUNTIME For hackers, the money is in applications and the databases they access. For enterprises, the distributed, dynamic nature of applications and

PREVOTY APPLICATION SECURITY MONITOR AND PROTECT YOUR APPLICATIONS AT RUNTIME For hackers, the money is in applications and the databases they access. For enterprises, the distributed, dynamic nature of applications and

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36
993ETTM: A Scalable Fault Tolerant Network Manager Colin Dixon Hardeep Uppal Vjekoslav Brajkovic Dane Brandon Thomas Anderson Arvind Krishnamurthy University of Washington Abstract In this paper, we design, implement, and e

ETTM: A Scalable Fault Tolerant Network Manager Colin Dixon Hardeep Uppal Vjekoslav Brajkovic Dane Brandon Thomas Anderson Arvind Krishnamurthy University of Washington Abstract In this paper, we design, implement, and e

Add to Reading List

Source URL: colindixon.com

Language: English - Date: 2012-04-28 16:29:27
994Improving Security Decisions with Polymorphic and Audited Dialogs José Carlos Brustoloni and Ricardo Villamarín-Salomón Department of Computer Science University of Pittsburgh

Improving Security Decisions with Polymorphic and Audited Dialogs José Carlos Brustoloni and Ricardo Villamarín-Salomón Department of Computer Science University of Pittsburgh

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-05-29 23:53:14
995Inside the Beltway The ITEA Journal of Test and Evaluation 2016; 37: 10-16 Copyright © 2016 by the International Test and Evaluation Association Defense System Complexity: Engineering Challenges and Opportunities

Inside the Beltway The ITEA Journal of Test and Evaluation 2016; 37: 10-16 Copyright © 2016 by the International Test and Evaluation Association Defense System Complexity: Engineering Challenges and Opportunities

Add to Reading List

Source URL: www.acq.osd.mil

Language: English - Date: 2016-04-15 16:55:43
996

PDF Document

Add to Reading List

Source URL: european-space-solutions.eu

Language: English - Date: 2016-05-24 12:00:15
997Demo: User Identification and Authentication with Capacitive Touch Communication †  Tam Vu† , Ashwin Ashok† , Akash Baid† , Marco Gruteser† ,

Demo: User Identification and Authentication with Capacitive Touch Communication † Tam Vu† , Ashwin Ashok† , Akash Baid† , Marco Gruteser† ,

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2012-07-09 23:12:27
998Downloadable Software Guidelines Funmoods is committed to ethical standards for downloadable Downloadable Software Application (

Downloadable Software Guidelines Funmoods is committed to ethical standards for downloadable Downloadable Software Application ("Downloadable Software Application") and follows these guidelines: • No Downloadable Soft

Add to Reading List

Source URL: www.funmoods.com

Language: English - Date: 2013-01-24 10:11:01
999Welcome to ISSE / OID 2015 Norbert Pohlmann Chairman: IT security association TeleTrusT Professor: Westphalian University of Applied Sciences Director:

Welcome to ISSE / OID 2015 Norbert Pohlmann Chairman: IT security association TeleTrusT Professor: Westphalian University of Applied Sciences Director:

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-11-26 09:39:11
1000the importance of layered security_fin-01

the importance of layered security_fin-01

Add to Reading List

Source URL: nl.malwarebytes.com

Language: English - Date: 2016-07-07 13:03:55