Computer security

Results: 47159



#Item
591System administration / Unix / USENIX / Computing / Large Installation System Administration Conference / LISA / Computer science / Information technology / Niels Provos / USENIX Annual Technical Conference

UPCOMING EVENTS USENIX Security ’16: 25th USENIX Security Symposium August 10–12, 2016, Austin, TX, USA www.usenix.org/sec16 LISA16

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-07-15 19:30:00
592Internet privacy / Computing / Computer security / Privacy / HTTP cookie / Digital media / Personally identifiable information / Medical privacy / P3P / Zombie cookie

Microsoft Word - privacy-policy-template.docx

Add to Reading List

Source URL: www.bestdefender.com

Language: English - Date: 2015-08-24 22:11:39
593Computing / Graphics file formats / Security / World Wide Web / Image compression / Open formats / ISO standards / Crime prevention / JPEG / Computer security / GIF / Web banner

Media Pack 2016 Issue 1 | January 2016 www.securityadvisorme.com

Add to Reading List

Source URL: www.securityadvisorme.com

Language: English - Date: 2016-07-13 09:19:18
594Internet privacy / Computing / Privacy / HTTP cookie / Personally identifiable information / Computer security / Government / P3P

Privacy Policy Privacy Statement Thanks for visiting website of Indian Institute of Management, Ahmedabad (IIMA). IIMA understands that the privacy of its users is important. Information collected on http://www.iimahd.er

Add to Reading List

Source URL: www.iima.ac.in

Language: English - Date: 2011-06-15 07:09:42
595Software / System software / Computer security / Antivirus software / Malwarebytes / Malware / Avira / Marcin Kleczynski

C A S E S T U DY Vermeer deploys industrial-strength anti-malware detection The security team uses Malwarebytes Endpoint Security to remediate and prevent new malware infections while simplifying remote monitoring and s

Add to Reading List

Source URL: br.malwarebytes.com

Language: English - Date: 2016-07-07 18:30:53
596Computing / Computer security / Cyberwarfare / Hacking / Data management / Software architecture / Software testing / SQL / SQL injection / Foundstone / OWASP / Vulnerability

Microsoft PowerPoint - AnIntroductionToApplicationSecurityInJ2EEEnvironments_JavaMUG.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:16:27
597Computer security / Cyberwarfare / Software / Antivirus software / Malwarebytes / Malware / Computer virus / Ransomware / Zero-day / Rootkit / Marcin Kleczynski

C A S E S T U DY Agnico Eagle Mines Ltd. strikes gold with Malwarebytes Malwarebytes proactively blocks exploits from entering and digging in Business profile

Add to Reading List

Source URL: de.malwarebytes.com

Language: English - Date: 2016-07-21 17:39:02
598Software / Computer access control / Obfuscation / Password / Security / Form / Pass / Invoice / Self-service password reset

1. Go to https://members.nacda.com 2. On the left side, choose ‘My Information’ to input your login information. If you do not remember your password, select ‘Forgot Password’ and an email will be sent with a l

Add to Reading List

Source URL: grfx.cstv.com

Language: English - Date: 2016-07-15 10:36:24
599Computer security / Security / Computing / Data security / Information Security Forum / Crime prevention / Cryptography / National security / Standard of Good Practice / Information security / Payment Card Industry Data Security Standard / COBIT

2014 ISF 25th Anniversary Logo Blue with Red Text

Add to Reading List

Source URL: www.securityforum.org

Language: English - Date: 2015-11-27 07:52:37
600Computing / Cloud computing / Cloud infrastructure / Computer security / Cloud computing security / Cloud computing issues / HP Cloud

Thought Leadership Making cloud work for business We are regularly told in survey after survey that corporate concerns about security are the biggest barrier to

Add to Reading List

Source URL: www.nttsecurity.com

Language: English - Date: 2016-07-26 13:06:42
UPDATE