Computer security

Results: 47159



#Item
481Security / Computing / Computer security / Cyberwarfare / Cybercrime / National security / E-commerce / Cyber-attack / Cyberwarfare in the United States

SPECIAL FEATURE JULY 2O16 VOLUME 19 / ISSUE 2 System-Aware Cyber

Add to Reading List

Source URL: www.acq.osd.mil

Language: English - Date: 2016-08-02 11:17:13
482Computer access control / Computer security / Cryptography / Technology / Multi-factor authentication / Authentication / Smart card / Mobile phone / Truphone / Subscriber identity module / Electronic authentication / Security token

ConsentID_datasheet1.indd

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:55
483Engineering / Security / Prevention / Crime prevention / Cryptography / Information governance / National security / Data security / Reliability engineering / Systems engineering / Computer security / Information security

IPA事業案内2015(表紙

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2016-07-11 21:19:33
484Software / Computer security / System software / Antivirus software / ESET NOD32 / ESET / Computer virus / Avira / Rootkit / Malware / Comparison of antivirus software / Norton Internet Security

Making the Internet Safer for You to Enjoy Explore the great online, securely protected by award-winning ESET NOD32 detection technology. It’s trusted by over 100 million users worldwide to detect and neutralize all t

Add to Reading List

Source URL: cdn5-prodint.esetstatic.com

Language: English - Date: 2016-07-26 04:26:22
485Computer security / Cyberwarfare / Security / Cryptography / Antivirus software / Computer network security / Secure communication / Malware / Internet security / Vulnerability / Computer virus / Trusted computing base

The next step in IT security after Snowden Norbert Pohlmann Institute for Internet Security - if(is), Westphalian University of Applied Sciences Gelsenkirchen Neidenburger Str. 43, 45877 Gelsenkirchen, Germany

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-12-20 08:00:14
486Security / Cyberwarfare / Cybercrime / Computer network security / Computer security / Cryptography / Secure communication / Internet privacy / Privacy

EEMA online January 2015 Issue 1 EEMA conferences Trust in the Digital World 2015 Trusting Big Data: driving new business without compromising privacy 25–26 February 2015, Madrid

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:12
487Computer hardware / Economy / Computing / Peripheral Component Interconnect / Invoice / Email / Fax / Conventional PCI / Mail / Billing

PCI Security Standards Council, LLC 401 Edgewater Place, Suite 600 • Wakefield, MA USAPhone: +Option 2) • Fax: +www.pcisecuritystandards.org PCI SMALL MERCHANT REFERENCE GUIDE O

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2016-08-19 10:18:03
488Malware / Marketing / Computer security / Adware / Advertising / Deception / Internet marketing / Malvertising / Online advertising / Trustwave Holdings

WHAT IS MALVERTISING? Malicious advertising (Malvertising) is a malware attack that uses online ads to spread malicious code HOW MALVERTISNG WORKS You visit a website with an infected banner

Add to Reading List

Source URL: nl.malwarebytes.com

Language: English - Date: 2016-05-10 22:53:50
489Computer security / Computing / Prevention / Security Target / Common Criteria / Evaluation Assurance Level / Evaluation / Information security

Microsoft Word - Outline_CC_Developers.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:42:46
UPDATE