Computer security

Results: 47159



#Item
851Computer security / Cryptography / Computing / Security / Trusted Platform Module / Data in use / Embedded system / Physical unclonable function / Trusted Computing / Software / Operating system / Key management

Secure Embedded Systems Michael Vai, David J. Whelihan, Benjamin R. Nahill, Daniil M. Utin, Sean R. O’Melia, and Roger I. Khazan Developers seek to seamlessly integrate cyber

Add to Reading List

Source URL: www.ll.mit.edu

Language: English - Date: 2016-07-12 15:07:52
852Computing / Software / Computer network security / E-commerce / Secure communication / Remote desktop / Internet security / CVSS / OpenVAS / Transport Layer Security / Remote Desktop Protocol / Internet Information Services

OpenVas Vulnerability Report HackerTarget.com OpenVas Vulnerability Report HackerTarget.com

Add to Reading List

Source URL: hackertarget.com

Language: English - Date: 2015-12-08 04:52:50
853Computing / Software / Security / Companies based in Bangalore / Sasken Communication Technologies / E-commerce / Smartphones / Internet of things / Computer security / Android / Rajiv C. Mody

Rising in the Perfect Storm ANNUAL REPORT a business environment chacterized by constant

Add to Reading List

Source URL: www.sasken.com

Language: English - Date: 2016-06-24 05:27:07
854Waste management / Computer recycling / Data security / Electronic waste / Natural environment / Recycling Lives / Recycling / Waste / Reuse / Industrial ecology / Appliance recycling / Waste Electrical and Electronic Equipment Directive

Computer recycling Secure data destruction and environmentally responsible computer hardware recycling Sustaining charity through metal and waste recycling

Add to Reading List

Source URL: www.recyclinglives.com

Language: English - Date: 2014-06-17 10:07:46
855Privacy / Data security / Internet privacy / Data protection / Computer security / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Computing / Personally identifiable information / Information privacy / Data Protection Act

Informative Note (Art. 13 of Legislative Decree no. 196 of 30 JuneThis informative note is provided for users who interact with the web services of BONNE NOUVELLE S.r.l., with registered office and headquarters in

Add to Reading List

Source URL: www.jkplace.com

Language: English - Date: 2015-11-30 05:25:12
856Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Hong Kong / Information security / Computer security

Dear OGCIO, I am very encouraged after reading the consultation paper on 2014 Digital 21 Strategy. The paper gives the impression Hong Kong will leverage its ICT achievements, huge pool of young, enthusiastic and innova

Add to Reading List

Source URL: www.digital21.gov.hk

Language: English - Date: 2014-01-20 06:40:06
857Cryptography / Security / Cyberwarfare / Michael McCaul / RSA Security / Encryption / Computer security / United States House Committee on Homeland Security / Privacy

Officials, Executives Envision Encryption Commission Industry executives and government officials hope to bridge the divide over privacy and national security By CAT ZAKRZEWSKI March 4, :14 a.m. ET As Apple Inc. a

Add to Reading List

Source URL: homeland.house.gov

Language: English - Date: 2016-03-04 14:30:03
858System software / Software / Computer architecture / System administration / Secure Shell / Internet Standards / Unix / Cryptographic software / Filesystem Hierarchy Standard / Chroot / OpenSSH / Passwd

http://www.LinuxSecurity.com Security Glossary:

Add to Reading List

Source URL: en.tldp.org

Language: English - Date: 2000-09-18 13:37:46
859Malware / Computer security / Cyberwarfare / Antivirus software / Malwarebytes Anti-Malware / Computer virus / Ransomware / Zero-day / Rootkit

C A S E S T U DY Agnico Eagle Mines Ltd. strikes gold with Malwarebytes Malwarebytes proactively blocks exploits from entering and digging in Business profile

Add to Reading List

Source URL: br.malwarebytes.com

Language: English - Date: 2016-07-21 17:36:12
860Software / Computer security / System software / Antivirus software / Malwarebytes Anti-Malware / Malware / Avira / Zero-day / Computer virus / IObit / Bleeping Computer

C A S E S T U DY City of Westfield evicts malware Local government uses Malwarebytes to keep city employees running at peak performance Business profile

Add to Reading List

Source URL: it.malwarebytes.com

Language: English - Date: 2016-07-07 18:37:33
UPDATE