Computer security

Results: 47159



#Item
321Security / Cyberwarfare / Computer security / Hacking / Cross-site request forgery / Cross-site scripting / Confused deputy problem / Common Weakness Enumeration / Directory traversal attack / Vulnerability / Access control / Web framework

Research Report: Mitigating LangSec Problems With Capabilities Nathaniel Wesley Filardo Johns Hopkins University Baltimore, MD

Add to Reading List

Source URL: spw16.langsec.org

Language: English - Date: 2016-06-05 23:38:35
322Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Kaspersky Anti-Virus / Microsoft Forefront / Kasperski / Marcin Kleczynski / Kaspersky Lab

C A S E S T U DY Frontier School Division banishes malware Remote school district uses Malwarebytes Anti-Malware for Business to eliminate malware without flying staff to each location Business profile

Add to Reading List

Source URL: ru.malwarebytes.com

Language: English - Date: 2016-07-07 18:42:41
323Academia / Metaphysics / Philosophy / Formal sciences / Complex systems theory / Crime prevention / Cryptography / National security / Complexity / Emergence / Computer security / The Age of Spiritual Machines

Security Watch Rebecca T. Mercuri Superscaled Security Exponential increases in computational speed, memory capacity, and

Add to Reading List

Source URL: www.notablesoftware.com

Language: English - Date: 2007-02-28 17:32:49
324Cyberwarfare / Computer virus / Deception / Internet security / AIDS / Antivirus software / Comparison of computer viruses / Abraxas

VIRUS BULLETIN MARCH … VIRUS ANALYSIS 2 Olympic Games Mikko Hypponen

Add to Reading List

Source URL: www.virusbulletin.com

Language: English - Date: 2016-08-02 05:30:54
325Prevention / Security / Safety / Crime prevention / Cryptography / Information governance / National security / Information security / Social Security number / Computer security / Social Security / Confidential

Information Security Compliance Form Please complete and return to the Office of Minority Student Affairs.

Add to Reading List

Source URL: www.omsa.illinois.edu

Language: English - Date: 2014-06-03 12:10:58
326Computer network security / Security / Computing / Cyberwarfare / IEEE 802.1X / Wireless security / Wi-Fi Protected Access / Wireless LAN / Access control / Health Insurance Portability and Accountability Act / Computer security / Payment Card Industry Data Security Standard

Microsoft Word - Enable Networks HIPAA Compliance draft v1.doc

Add to Reading List

Source URL: www.powercloudsystems.com

Language: English - Date: 2013-04-08 21:26:42
327Civil society / Volunteering / Ethics / Economy / Security / Giving / Philanthropy / Social philosophy / Occupational safety and health / Computer security / Volunteer Center / International volunteering

Welcome ... to the world of volunteering This pack is designed as an introduction to volunteering and gives a few ideas

Add to Reading List

Source URL: www.communityactionhertsmere.org

Language: English - Date: 2012-05-04 07:05:22
328Software / Food and drink / Computing / Social networking services / Parking / Tapa / F-Secure / Computer security / Social media / Foursquare / Tapa /  Estonia

Decembervigilant THE MONTHLY CARGO CRIME UPDATE FOR MEMBERS OF TAPA EMEA A YEAR OF NON-STOP

Add to Reading List

Source URL: www.tapaemea.org

Language: English - Date: 2014-12-22 06:36:14
329File sharing / Intellectual property law / Copyright law / Law / Computing / Copyright infringement / Peer-to-peer file sharing / Copyright law of the United States / Copyright / Ripping / Peer-to-peer / Copynorms

COPYRIGHT AND SECURITY GUIDE FOR SOUTH AFRICAN CORPORATES – MAY 2016 Your company, and brand, are at risk if motion pictures, TV series, interactive computer games, sport, music or other copyrighted material are stored

Add to Reading List

Source URL: www.saf-act.co.za

Language: English - Date: 2016-06-07 04:10:10
330Human resource management / Security / Business software / Working time / Business / Economy / Workforce management / Computer security / Time and attendance / Global Positioning System / Access control

Young businesswoman holding a telephone working in office

Add to Reading List

Source URL: autotimesystems.co.uk

Language: English - Date: 2016-07-12 03:22:31
UPDATE