Computer security

Results: 47159



#Item
631Computer access control / Cryptography / Software / Password / Security / Cryptographic software / Random password generator / Passwd / Passphrase / Keeper / Crypt / KeePass

Central Connecticut State University Elihu Burritt Library Newsletter CRASH Shown at Burritt Library

Add to Reading List

Source URL: library.ccsu.edu

Language: English - Date: 2010-07-26 11:08:41
632IT risk management / Security / Information technology management / Computing / Disaster recovery / Data management / Backup / Cryptography / Emergency management / Computer security / Emergency communication system / Business continuity planning

SearchSMBStorage business continuity plan template

Add to Reading List

Source URL: www.clic.net

Language: English - Date: 2016-01-26 15:10:57
633Malware / Cyberwarfare / Trojan horses / Computing / Computer network security / Botnets / Rootkits / Zeus / SpyEye / Cybercrime / Computer security

FROM RUSSIA TO HOLLYWOOD: TURNING THE TABLES ON A SPYEYE CYBERCRIME RING

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2012-01-26 20:15:24
634Computer access control / Cryptography / Computer security / Prevention / Multi-factor authentication / Authentication / Financial technology / Password

CASE STUDY Cyber-security offering strong, cost effective two factor authentication. Small businesses

Add to Reading List

Source URL: www.digitalcatapultcentre.org.uk

Language: English - Date: 2016-03-09 06:12:58
635Computing / Wireless networking / Computer security / Cryptography / Computer network security / Extensible Authentication Protocol / Internet protocols / Wi-Fi / IEEE 802.1X / Xsupplicant / Authentication protocol / RADIUS

802.1x/EAP Authentication Guide RadiusNT/X V5.1 IEA Software, Inc. Administrative and Support Office PO BOX 1170

Add to Reading List

Source URL: www.iea-software.com

Language: English - Date: 2013-02-15 13:27:42
636Computer security / Cyberwarfare / Security / Cybercrime / Antivirus software / Computer network security / E-commerce / Secure communication / Phishing / Malware / Computer worm / Trusteer

the importance of layered security_fin-01

Add to Reading List

Source URL: ru.malwarebytes.com

Language: English - Date: 2016-07-07 13:10:29
637Security / Cryptography / Cyberwarfare / Computer network security / Biological engineering / Body area network / Wireless networking / Internet privacy / Health informatics / Computer security / Encryption / Medical privacy

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-01-19 08:03:23
638Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Computer virus / Zero-day / Avira / Rogue security software / Draft:Marcin Kleczynski / Marcin Kleczynski

C A S E S T U DY Imperial College gives malware a failing grade With Malwarebytes Anti-Malware for Business, the university proactively protects valuable intellectual property on thousands of PCs

Add to Reading List

Source URL: de.malwarebytes.com

Language: English - Date: 2016-07-07 18:32:31
639Computing / Security / Policy / Crime prevention / Cryptography / Information governance / National security / Internet privacy / Privacy policy / Privacy / Computer security / Cloud computing

Embracing Policy Engineering Kathi Fisler Shriram Krishnamurthi Daniel J. Dougherty

Add to Reading List

Source URL: web.cs.wpi.edu

Language: English - Date: 2010-10-21 09:43:59
640Cryptography / Secure multi-party computation / Secure two-party computation / Ciphertext indistinguishability / Consensus / Secret sharing / IP / Control theory

MPC vs. SFE: Perfect Security in a Unified Corruption Model ? Zuzana Beerliov´a-Trub´ıniov´a, Matthias Fitzi, Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich {bzuzana,fitzi,hir

Add to Reading List

Source URL: www.cs.rpi.edu

Language: English - Date: 2011-02-19 14:29:40
UPDATE