Computer security

Results: 47159



#Item
271Security / Computer network security / Cyberwarfare / Computer security / Cybercrime / Cryptography / Threat

Experimental  Challenges  in  Cyber  Security:   A  Story  of  Provenance  and  Lineage  for  Malware   Tudor  Dumitraș                  

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-08-22 18:12:38
272Security / Cyberwarfare / E-commerce / Internet bot / Credential stuffing / Computer security / Malaysia Airlines / Airline

F100 Airline Case Study INTERNATIONAL AIRLINE FIGHTS FARE SCRAPERS

Add to Reading List

Source URL: www.shapesecurity.com

Language: English - Date: 2016-08-12 14:49:29
273Internet privacy / World Wide Web / HTTP cookie / Google Analytics / Computer security / Cookie / Computing / Zombie cookie / Secure cookies

Storm_Print_Extension_Logo_RGB

Add to Reading List

Source URL: www.stormdigital.com

Language: English - Date: 2015-04-09 06:00:58
274Computer access control / Internet privacy / Hypertext Transfer Protocol / Computing / HTTP cookie / Computer security / World Wide Web / Login / Session / Cookie / Secure cookies / Zombie cookie

Inverclyde Council Cookie Usage Inverclyde Council does not store any personal or tracking information on your computer via its web site. We use only the cookies detailed below which are deemed essential to the functiona

Add to Reading List

Source URL: www.inverclyde.gov.uk

Language: English
275Cyberwarfare / Security / Computer security / Cybercrime / National security / Computer network security / Cryptography / Cyber-security regulation / Cybersecurity CS5L CMM

Security  is  Not  a  Commodity:   The  Road  Forward  for  Cybersecurity  Research   Stefan  Savage   UC  San  Diego    

Add to Reading List

Source URL: cra.org

Language: English - Date: 2016-03-07 14:51:02
276Computing / Internet / Network architecture / Internet Standards / Internet protocols / Networking hardware / Computer network security / Telnet / Internet protocol suite / Firewall / File Transfer Protocol / Gateway

A Network Firewall Marcus J. Ranum Digital Equipment Corporation Washington Open Systems Resource Center, Greenbelt, MD June 12, 1992

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2007-12-29 18:01:38
277Computing / Cyberwarfare / Cybercrime / Spamming / Computer security / Computer network security / Identity theft / Phishing / Malware / Computer virus / Carbanak / Email spam

TABLE OF CONTENTS Introduction 2 Key findings

Add to Reading List

Source URL: www.group-ib.com

Language: English - Date: 2016-03-17 04:17:16
278Computing / Network architecture / Transmission Control Protocol / Server / Internet Relay Chat / Network protocols / Computer network security / Internet protocols

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYDistributed System Engineering: SpringQuiz I Solutions

Add to Reading List

Source URL: nil.csail.mit.edu

Language: English - Date: 2015-01-05 06:37:34
279Security / Cybercrime / Prevention / Cryptography / Safety / Identity documents / E-commerce / Social engineering / Password / Internet privacy / Computer security / Medical privacy

How to Keep Your Personal Information Secure

Add to Reading List

Source URL: www.documentdestruction.mobi

Language: English - Date: 2015-06-14 09:26:15
280Internet privacy / HTTP cookie / Privacy / Personally identifiable information / Computer security / Computing / Digital media

PRECEDENTIAL UNITED STATES COURT OF APPEALS FOR THE THIRD CIRCUIT _______________ No_______________

Add to Reading List

Source URL: www2.ca3.uscourts.gov

Language: English - Date: 2016-06-27 12:19:00
UPDATE