Computer security

Results: 47159



#Item
291Computer graphics / Computing / Graphics file formats / Vector graphics / Digital press / Portable Document Format / End-of-file / Wavefront .obj file

Caradoc: a Pragmatic Approach to PDF Parsing and Validation IEEE Security & Privacy LangSec Workshop 2016 Guillaume Endignoux Olivier Levillain Jean-Yves Migeon École Polytechnique, France

Add to Reading List

Source URL: spw16.langsec.org

Language: English - Date: 2016-06-05 23:39:17
292Computer access control / Cryptography / Software / Computer security / YubiKey / Hash-based message authentication code / Double-click / Configure script / Authentication

How to Configure Identical Credentials Configuration Guide

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-06-22 18:25:41
293Security engineering / Safety / Security / Lidar / Robotic sensing / Unmanned aerial vehicle / Computer security / Security alarm / Velodyne Inc. / Draft:Princeton Lightwave Inc.

Quanergy Systems to Showcase Powerful LiDAR Security Detection System at ISC West Surveillance solution from leading LiDAR company detects threats in real 3D space April 06, :00 AM Pacific Daylight Time

Add to Reading List

Source URL: www.quanergy.com

Language: English - Date: 2016-05-16 02:32:19
294Computer access control / Cryptography / Prevention / Computer security / Password / Citigroup / Login / Authentication

How  to  use  the  UGA  CITI  Login  Portal   Introduction.   All  UGA  faculty,  staff  and  students  who  take  or  desire  to  take  training  on  

Add to Reading List

Source URL: gear.ovpr.uga.edu

Language: English - Date: 2015-05-14 16:52:32
295Computer security / Security / Access control / Computer access control / XACML / PERMIS / Identity management / Role-based access control / Authorization / Model-driven security / PDP / Toolchain

A Toolchain for Model-Based Design and Testing of Access Control Systems Said Daoudagh1 , Donia El Kateb2 , Francesca Lonetti1 , Eda Marchetti1 and Tejeddine Mouelhi3 1 Istituto di Scienza e Tecnologie dell’Informazio

Add to Reading List

Source URL: www.itrust.lu

Language: English - Date: 2015-03-09 10:06:50
296Security / Cryptography / Computing / Prevention / Data security / Secure communication / Crime prevention / National security / Key management / Computer security / Data breach / SafeNet

For more information, please visit: 1 www.securethebreach.com

Add to Reading List

Source URL: breachlevelindex.com

Language: English - Date: 2016-08-03 15:31:24
297Software / Computing / Remote desktop / System software / X Window System / Virtual Network Computing / Thin client / Password / Computer security / GO-Global / Security and safety features new to Windows Vista

Secure Mobile Computing via Public Terminals Richard Sharp1 , James Scott1 and Alastair R. Beresford2 1 Intel Research, 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK

Add to Reading List

Source URL: rich.recoil.org

Language: English - Date: 2006-05-23 08:53:35
298Security / Prevention / Computer network security / Computer security / Crime prevention / Cryptography / Cyberwarfare / National security / National Security Agency

YOUR COUNTRY NEEDS YOU: HERE’S HOW TO ANSWER THE CALL! BRIGADIER GENERAL JOHN ADAMS, US ARMY (RET) & LIEUTENANT COLONEL CHRIS COURTNEY, US ARMY (RET)

Add to Reading List

Source URL: nssp.unm.edu

Language: English - Date: 2012-02-22 13:09:17
299Computing / Spamming / Cyberspace / Cyberwarfare / Computer network security / Multi-agent systems / Botnets / Email spam / MessageLabs / Anti-spam techniques / Festi / Proofpoint /  Inc.

MessageLabs Intelligence: NovemberIntroduction Welcome to the November edition of the MessageLabs Intelligence monthly report. This report provides the latest email threat trends for November 2005 to help in

Add to Reading List

Source URL: londonactionplan.org

Language: English - Date: 2016-04-26 15:59:20
300Computing / Computer network security / Cyberwarfare / Multi-agent systems / Spamming / Recreational Software Advisory Council / Self-censorship / Botnet / Malware / Bitstream Cyberbit / Steganography / Censorship

SESSION ID: GPS2-F04 A Global Enterprise Confronts Targeted Attacks Ginnwann Teo Head of Pre-Sales

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2016-07-18 23:27:59
UPDATE