Computer security

Results: 47159



#Item
161

Computer Security for Data Collection Technologies Camille Cobb∗, Samuel Sudar∗ Nicholas Reiter, Richard Anderson, Franziska Roesner, Tadayoshi Kohno {cobbc12, sudars, nreiter, anderson, franzi, yoshi}@cs.washington.

Add to Reading List

Source URL: www.franziroesner.com

- Date: 2016-04-04 17:22:24
    162

    The Security of a Mix-Center Based on a Semantically Secure Cryptosystem Douglas Wikstr¨om Swedish Institute of Computer Science (SICS)

    Add to Reading List

    Source URL: www.nada.kth.se

    - Date: 2012-05-30 08:33:53
      163

      Finding Security Vulnerabilities in Java Applications with Static Analysis V. Benjamin Livshits and Monica S. Lam Computer Science Department Stanford University {livshits, lam}@cs.stanford.edu

      Add to Reading List

      Source URL: suif.stanford.edu

      - Date: 2005-07-19 02:30:55
        164

        To appear in Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSFAuthentication without Elision Partially Specified Protocols, Associated Data, and Cryptographic Models Described by Code

        Add to Reading List

        Source URL: web.cs.ucdavis.edu

        - Date: 2009-04-30 15:56:53
          165

          Virtualized In-Cloud Security Services for Mobile Devices Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, Jason Flinn, Farnam Jahanian Electrical Engineering and Computer Science Department University of Michigan, Ann

          Add to Reading List

          Source URL: jon.oberheide.org

          - Date: 2015-10-11 18:23:19
            166

            Master-Arbeit im Bereich der praktischen IT-Sicherheit! UNIVERSITY OF CALIFORNIA IN SANTA BARBARA (UCSB) Die Computer Security Group der UCSB gibt ein bis zwei MasterStudierenden der IT-Sicherheit die Möglichkeit, im Wi

            Add to Reading List

            Source URL: www.ei.ruhr-uni-bochum.de

            - Date: 2016-08-02 02:44:58
              167Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Huntington /  West Virginia / Registrar / Computer security / Information security

              Banner Student Access Request Office Location: 271 Huntington Avenue • Phone: • Fax:

              Add to Reading List

              Source URL: www.northeastern.edu

              Language: English - Date: 2015-06-25 11:31:34
              168Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Avira / Computer virus / Zero-day / Marcin Kleczynski

              C A S E S T U DY Food for the Hungry stops malware in its tracks This nonprofit uses Malwarebytes Anti-Malware for Business to detect and stop malware from gobbling valuable time from its mission

              Add to Reading List

              Source URL: pt.malwarebytes.com

              Language: English - Date: 2016-07-07 18:41:23
              169Computing / Computer data storage / Telecommunications engineering / Data management / Storage area network / Fibre Channel / XAM / Storage security / ISO/IEC 27040

              STORAGE NETWORKING STANDARDS Management and Administration Building a Working Knowledge of Storage Networking Operations through a clear understanding of Solutions & Technology For professionals who are implementing and

              Add to Reading List

              Source URL: www.snia-sa.org

              Language: English - Date: 2010-10-20 15:16:23
              170Security / Prevention / Safety / Emergency management / Disaster preparedness / Humanitarian aid / Occupational safety and health / Computer security / Champaign /  Illinois / In Case of Emergency / Emergency

              Volunteer Application Name Date Home (Street) Address

              Add to Reading List

              Source URL: www.c-uphd.org

              Language: English - Date: 2012-07-05 15:28:24
              UPDATE