Computer security

Results: 47159



#Item
651Security / Computer security / Cyberwarfare / Computer network security / Crime prevention / Cryptography / National security / Government procurement in the United States / Critical infrastructure protection / NIST Cybersecurity Framework

DEFENSE CYBERSECURITY REQUIREMENTS: WHAT SMALL BUSINESSES NEED TO KNOW Office of Small Business Programs, U.S. Department of Defense 3600 Defense Pentagon, Room 3E185, Washington, DCWhy is cybersecurity impor

Add to Reading List

Source URL: www.acq.osd.mil

Language: English
652Cryptography / Authenticated encryption / Symmetric-key cryptography / Initialization vector / Block cipher mode of operation / Semantic security / Pseudorandom function family / Key Wrap / Advantage / Chosen-plaintext attack / Probabilistic encryption / Ciphertext indistinguishability

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:23:28
653Computer security / Cyberwarfare / Security / Cybercrime / Antivirus software / Computer network security / E-commerce / Secure communication / Phishing / Malware / Computer worm / Trusteer

the importance of layered security_fin-01

Add to Reading List

Source URL: www.malwarebytes.com

Language: English - Date: 2016-08-19 18:33:37
654Security / Computer security / Computing / Software testing / Computer network security / Cryptography / National security / Information security / Penetration test / Professional certification / Vulnerability / Security testing

Microsoft Word - choose_the_right_pentesting_company.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:21:33
655Security / Prevention / Safety / National security / Crime prevention / Cryptography / Information governance / Computer security / Information security / Outline of computer security / Cyber security standards

Industrial & Research Challenges arising from User Requirements in Trustworthy ICT Building a European Security Environment among regions Prof. Norbert Pohlmann

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-12-06 08:01:09
656Software engineering / Security / Computer programming / Access control / Computer access control / Kernel / JavaScript / Object-oriented programming / Data-flow analysis / Database / Program analysis

Leveraging “Choice” to Automate Authorization Hook Placement Divya Muthukumaran Trent Jaeger

Add to Reading List

Source URL: www.cse.psu.edu

Language: English - Date: 2012-12-21 22:14:54
657Security / Cyberwarfare / Computer network security / Computer security / Cryptography / National security / Secure communication / Skybox

Under embargo until release at 8am EST, Wednesday, February 3rd, 2016 Skybox Security Gets $96 Million Investment from Providence Equity to Fuel Growth The fast-growing security analytics company will use funds to furth

Add to Reading List

Source URL: rembrandtvc.com

Language: English - Date: 2016-02-03 14:13:55
658Cryptography / Computing / Computer access control / Transport Layer Security / Public-key cryptography / Cryptographic protocols / Secure communication / Man-in-the-middle attack / Mutual authentication / Authentication / Public key infrastructure / Phishing

IdenTrust™: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrust™ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-05-01 19:01:13
659Economy / Business / Security / Cybercrime / Cyberwarfare / National security / Small business / Small Business Administration / Computer security / New York State Small Business Development Center / Florida Small Business Development Center Network

Improving Small Business Cyber Security Act of 2016 Rep. Richard Hanna () | Rep. Derek Kilmer ()  Small businesses face a greater number of more sophisticated cyb

Add to Reading List

Source URL: hannaforms.house.gov

Language: English - Date: 2016-06-08 08:58:42
660Computing / Technology / Wi-Fi / Computer network security / Mobile security / Hotspot / Internet of things / Mobile malware / Computer security / Devicescape / Android / MiFi

MayAn eBook from the editors of FierceWireless

Add to Reading List

Source URL: www.cloudmark.com

Language: English - Date: 2014-07-22 12:19:02
UPDATE