Computer security

Results: 47159



#Item
201Computing / Cyberspace / Spamming / Spam filtering / Microsoft / Cybercrime / Email authentication / Email / DMARC / Phishing / Computer security / Outlook.com

CUSTOMER PROTECT – RESPOND Your brand at risk Today, within a couple of minutes anyone can send an email claiming to be you. These phishing emails can leverage the domains you own, such as your YourCompany.com, or they

Add to Reading List

Source URL: info.agari.com

Language: English - Date: 2016-07-16 12:51:44
202Computer security / Security / Computing / Software requirements / Cryptography / Crime prevention / Information governance / National security / Protection Profile / Common Criteria / Security Target / Requirement

Microsoft Word - PPWorkshopOutline.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:42:46
203Security / Prevention / Safety / Health informatics / Cryptography / Computer security / Crime prevention / National security / Personal health record / Electronic health record / Medical privacy / Regional Health Information Organization

Electronic Health Record Software Required Security Features and Recommendations for Technical Specifications of Single Source Contracts and RFI for the Behavioral Health Information Technology Grant Scope: the scope of

Add to Reading List

Source URL: www.fphny.org

Language: English - Date: 2016-04-29 15:58:09
204Computing / Cryptography / Computer security / Internet protocols / Computer access control / Internet Standards / Code division multiple access / Computer network security / Diameter protocol / Authentication protocol / RADIUS / OAuth

Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

Add to Reading List

Source URL: ietf.org

Language: English - Date: 2014-03-02 06:27:58
205Software / System software / Computer security / Antivirus software / Malwarebytes / Malware / Avira / Marcin Kleczynski

C A S E S T U DY Vermeer deploys industrial-strength anti-malware detection The security team uses Malwarebytes Endpoint Security to remediate and prevent new malware infections while simplifying remote monitoring and s

Add to Reading List

Source URL: fr.malwarebytes.com

Language: English - Date: 2016-07-07 18:35:52
206Computer-mediated communication / Videotelephony / Web conferencing / Teleconferencing / Educational technology / WebEx / Government / United States Department of Homeland Security / Homeland Security

NOTICE FY2016 Homeland Security Grant Program (HSGP) Application Workshop Location: State Emergency Management Agency (SEMAMilitia Drive, Jefferson City, Missouri

Add to Reading List

Source URL: dps.mo.gov

Language: English - Date: 2016-07-11 10:19:37
207Computing / Economy / Technology / E-commerce / Software / Information technology / Media technology / Computer security / Computer / Motel / Personal computer / Application software

Journ. of Intell Prop 1 - March, 2016.pmd

Add to Reading List

Source URL: cipo.gov.dm

Language: English - Date: 2016-04-18 15:39:09
208Computing / Computer security / Software bugs / Address space layout randomization / Gadget / Buffer overflow / Return-to-libc attack / Shellcode / Instruction selection / Position-independent code / NOP / Return-oriented programming

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
209Security / Cyberwarfare / Computer security / Computer network security / Cryptography / National security / Secure communication / International Multilateral Partnership Against Cyber Threats

Press Release Connected Vehicle Cybersecurity Creates Risks and Opportunities in Automotive Market, According to VDC Research Carmakers finally coming to grips with security threats, but still have a long road ahead. The

Add to Reading List

Source URL: www.vdcresearch.com

Language: English - Date: 2016-03-03 10:07:18
210Security / National Cooperative Highway Research Program / Transportation in the United States / Engineering / Computer security / Automation

TRB & Transformational Technologies Automated Vehicle Symposium July, 2016 TRANSFORMATIONAL TECHNOLOGIES:

Add to Reading List

Source URL: higherlogicdownload.s3.amazonaws.com

Language: English - Date: 2016-07-26 09:00:01
UPDATE