Computer security

Results: 47159



#Item
571Security / Prevention / Crime prevention / National security / Computer network security / Computer security / Cryptography / Cyberwarfare / Classified information

Position Designation Questionnaire

Add to Reading List

Source URL: www2.usgs.gov

Language: English - Date: 2016-05-25 09:18:36
572Technology / Digital media / Security / Digital rights / Ambient intelligence / Internet of things / Internet privacy / Internet / Privacy / E-commerce / Federal Trade Commission / Computer security

IA IoT Comment to NTIA

Add to Reading List

Source URL: internetassociation.org

Language: English - Date: 2016-06-01 16:49:03
573Software / Computer security / System software / Antivirus software / Computer virus / Malware / Zero-day / Intrusion detection system / Clam AntiVirus / Bitdefender / Mobile security / Avira

CloudAV: N-Version Antivirus in the Network Cloud Jon Oberheide, Evan Cooke, Farnam Jahanian Electrical Engineering and Computer Science Department University of Michigan, Ann Arbor, MI 48109 {jonojono, emcooke, farnam}@

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-11 18:23:54
574Crime / Security / Economy / Cybercrime / E-commerce / Crime prevention / Identity theft / Computer security / Online banking / Federal Deposit Insurance Corporation / Internet safety / Phishing

F E D E R A L D E P O S I T I N S U R A N C E

Add to Reading List

Source URL: www.banksc.com

Language: English - Date: 2016-03-09 16:04:53
575Malware / Cyberwarfare / Computer security / Ransomware / Cybercrime / Social engineering / Cryptography / Antivirus software / Computer virus / Phishing / Scareware / Locky

INFOGRAPHIC - MalwareBytes - Ransomware Infographic UPDATE

Add to Reading List

Source URL: nl.malwarebytes.com

Language: English - Date: 2016-07-07 13:03:55
576Security / Cyberwarfare / Computing / Computer security / Computer network security / Cybercrime / National security / Threat / Malware / Security hacker / Cyber-Insurance

training.keywcorp.com This two-day course introduces managers to the processes, techniques, and terminology used by cyber professionals to explain, discover, and prevent threats to enterprise networks and sensitive busi

Add to Reading List

Source URL: training.keywcorp.com

Language: English - Date: 2016-06-28 22:20:29
577Anime / Computing / Internet privacy / Fiction / Computer networking / Computer network security / Proxy list / Ergo Proxy / Proxy server

Instructors Guide Lesson Template

Add to Reading List

Source URL: oit.siu.edu

Language: English - Date: 2016-05-18 11:50:46
578Watermarking / Cryptography / Access control / Digital watermarking / Watermark / Security / Steganography / Ingemar Cox / JPEG / Cinavia / Audio watermark

An Adaptive Digital Image Watermarking Technique for Copyright Protection Chang-Hsing Lee (李建興) and Yeuan-Kuen Lee* (李遠坤) Department of Computer Science, Chinese Culture University 55 Hwa Kang Rd., Yang Ming

Add to Reading List

Source URL: debut.cis.nctu.edu.tw

Language: English - Date: 2013-07-12 03:09:44
579Security / Computing / Prevention / Secure communication / E-commerce / Crime prevention / Cryptography / National security / Trusteer / Itzik Kotler / Transport Layer Security / Computer security

SafeBreach Stop tomorrow’s breach. Today. In Plain Sight: The Perfect Exfiltration

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2016-05-27 09:10:01
580Security / Prevention / Identity management / Law / Privacy / Milind Tambe / Internet privacy / Computer security / Mathematical optimization / Resilient control systems

7th Conference on Decision and Game Theory for Security – GameSec 2016 New York, NY, USA Recent advances in information and communication technologies pose significant security challenges that impact all aspects of mod

Add to Reading List

Source URL: www.gamesec-conf.org

Language: English - Date: 2016-08-07 16:15:36
UPDATE