Computer security

Results: 47159



#Item
761Security / Computer access control / ISO standards / Ubiquitous computing / HID Global / Computer security / Smart cards / MIFARE / Access control / Single sign-on

Crescendo® Series Smart Cards CONVERGED SMART CARD FOR IDENTITY ASSURANCE SOLUTIONS

Add to Reading List

Source URL: planc.biz

Language: English - Date: 2013-12-17 10:24:55
762Computer security / Software / Cyberwarfare / Antivirus software / Malwarebytes / Malware / Rootkit / Computer virus / Avira / Ransomware / Spyware / Zero-day

C A S E S T U DY Gallup-McKinley County Schools successfully defends against ransomware Malwarebytes is a critical part of maintaining a safe learning environment Business profile

Add to Reading List

Source URL: pl.malwarebytes.com

Language: English - Date: 2016-07-06 12:41:45
763Computing / Security / Networking hardware / Gateway / Videotelephony / Home automation / Computer security / Router / Access control / Cloud computing

Netvox_Inspire the Next Netvox IoT Office Solution Taiwan Head Office: No. 21-1, Chung - Hua West Rd. Tainan, Taiwan China Factory: Xiamen Torch High Technology Industrial Development Zone

Add to Reading List

Source URL: www.netvox.com.tw

Language: English - Date: 2016-07-21 22:28:14
764Internet privacy / Computing / Privacy / Computer security / Data security / HTTP cookie / Information privacy / Personally identifiable information / Medical privacy / P3P / In re Gateway Learning Corp.

Information we collect: COOKIES This website may sometimes make use of cookies especially where we are using an analytics program to monitor visitor behaviour & site usage; WHAT ARE COOKIES? Small files stored on your co

Add to Reading List

Source URL: www.easymenu.co.uk

Language: English - Date: 2015-07-06 01:02:12
765Internet privacy / Computing / Privacy / Cyberspace / Computer security / HTTP cookie / Personally identifiable information / Medical privacy / P3P / Network Advertising Initiative

Privacy Policy This privacy policy sets out how the A.D.F.P. uses and protects any information that you give the A.D.F.P. when you use this website. The A.D.F.P. is committed to ensuring that your privacy is protected. S

Add to Reading List

Source URL: www.adfp.co.uk

Language: English - Date: 2012-01-11 09:49:19
766Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Zero-day / Avira / Marcin Kleczynski

C A S E S T U DY When it comes to malware defense, Gilbane Building Company nails it Gilbane crushes malware and exploits on its endpoints with Malwarebytes Endpoint Security

Add to Reading List

Source URL: pl.malwarebytes.com

Language: English - Date: 2016-07-07 18:40:15
767Computing / Software engineering / Software / Hypertext Transfer Protocol / JavaScript / Web development / World Wide Web / Ajax / HTTP cookie / Cross-site scripting / XMLHttpRequest / Cross-site request forgery

Laboratory for Computer Security Education 1 Cross-Site Scripting (XSS) Attack Lab cWenliang Du, Syracuse University.

Add to Reading List

Source URL: www.cis.syr.edu

Language: English - Date: 2010-11-01 16:33:26
768Ransomware / Malware / Cyberwarfare / Computer security / Cybercrime / Blackmail / Trojan horses / Computer virus / Antivirus software / PGPCoder / TeslaCrypt / CryptoLocker

2016 IEEE 36th International Conference on Distributed Computing Systems CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data Nolen Scaife

Add to Reading List

Source URL: www.cise.ufl.edu

Language: English
769Hacking / Software testing / Vulnerability / Flood / Physical geography / Prevention / Computer security

Sea Level Adaptation Working Group (SLAWG) Meeting Minutes Date: :30 – 10:00 am Attendees: Jim Walker (OOB), Bob Hamblen (Saco), Steve Zeeman (Biddeford), Jay Chace (Scarborough), Lucy LaCasse (Scarborough),

Add to Reading List

Source URL: www.smrpc.org

Language: English - Date: 2014-01-23 12:11:56
770Computing / Cloud computing / Software / Cryptography / Copy protection / FlexNet Publisher / System administration / Internet of things / Flexera Software / Installation / Computer security / Software as a service

Flexible licensing, activation, delivery and full lifecycle management Amy Konary – Research Vice President - Software Licensing &

Add to Reading List

Source URL: media.flexerasoftware.com

Language: English - Date: 2015-03-19 18:40:46
UPDATE