Computer security

Results: 47159



#Item
691Computing / Computer access control / Smartphones / Cloud clients / Personal computing / Information appliances / Security token / Multi-factor authentication / Touchscreen / IPhone / Token / Android

Smartphones Editor: Roy Want n Google n Personal TouchIdentification Tokens Tam Vu and Marco Gruteser

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2013-04-18 23:09:49
692Government / Security / Internet privacy / Policy / Privacy policy / Privacy / Medical privacy / Office of the Australian Information Commissioner / Computer security / In re Gateway Learning Corp. / Criticism of Facebook

Westpac Securities PhoneReply PaidAustralia Square NSW 1214

Add to Reading List

Source URL: onlineinvesting.westpac.com.au

Language: English - Date: 2014-11-21 18:18:54
693Computing / Security / Cyberwarfare / Computer security / Crime prevention / Cryptography / Information governance / National security / Application security / Cross-site request forgery / Software development kit / Vulnerability

#1 GLOBAL PAYMENTS COMPANY OPTIMIZES SECURE DEVELOPMENT PROCESS WITH PREVOTY Trusted payments provider with deeply embedded secure development culture partners with Prevoty for standardized, real-time application protect

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2016-08-18 22:09:36
694Computing / Security / E-commerce / Cyberwarfare / Domain Name System / Frontotemporal lobar degeneration / Computer security / Domain name

2016 Security Requirements: What Service Providers Need to Know June 9, 2016 Webinar Guidelines •

Add to Reading List

Source URL: www.ftld.com

Language: English - Date: 2016-08-02 14:05:01
695Cryptography / Cryptographic protocols / Secure multi-party computation / Public-key cryptography / Oblivious transfer / Information-theoretic security / Secure two-party computation / Commitment scheme

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-04-20 05:08:37
696Security / Computing / Data security / Splunk / System administration / Application firewall / Computer security / Ovum Ltd.

On the Radar: Prevoty provides a runtime application security platform for the enterprise Protection for large-scale runtime environments Publication Date: 29 Dec 2015

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36
697Malware / Marketing / Computer security / Adware / Advertising / Deception / Internet marketing / Malvertising / Online advertising / Trustwave Holdings

WHAT IS MALVERTISING? Malicious advertising (Malvertising) is a malware attack that uses online ads to spread malicious code HOW MALVERTISNG WORKS You visit a website with an infected banner

Add to Reading List

Source URL: pl.malwarebytes.com

Language: English - Date: 2016-05-10 23:13:50
698Security / E-commerce / Prevention / Auditing / Computer network security / Computer security / Cryptography / National security / Competence / Chief audit executive

ANC Customer Service Manager Reports to: Sales & Marketing Manager Division: Everts Air Cargo Department:

Add to Reading List

Source URL: www.evertsair.com

Language: English - Date: 2016-05-13 17:14:11
699E-commerce / Security / Cryptography / Computer network security / Computer security / National security / Secure communication / RSA

2016 Editorial Calendar Month Featured Topic Editorial Details

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2016-05-24 14:49:01
700Cybercrime / Security / Crime / Computing / Identity theft / Social engineering / Spamming / Phishing / Computer security / Email

JPCERT/CC Incident Handling Report[January 1, March 31, 2016]

Add to Reading List

Source URL: www.jpcert.or.jp

Language: English - Date: 2016-06-21 01:58:27
UPDATE