Computer security

Results: 47159



#Item
901Software / System software / Computing / Linux Foundation / University of Cambridge Computer Laboratory / Xen / Hardware virtualization / Hypervisor / Paravirtualization / Hardware-assisted virtualization / Hyper-V / Virtualization

Advanced Exploitation: Xen Hypervisor VM Escape Shangcong Luan May 27, 2016 Alibaba Cloud Platform Security Team

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2016-05-27 10:02:21
902Security / Data security / Privacy / Internet privacy / Computer security / Information privacy

Founder Bios Christian Bennefeld, Chief Executive Officer: Visionary and Corporate Developer Christian Bennefeld studied computer science and mathematics at the internationally renowned Technical University of Karlsruhe

Add to Reading List

Source URL: www.eblocker.com

Language: English - Date: 2015-12-23 10:53:28
903Malware / Cyberwarfare / Computer security / Trojan horses / Cybercrime / Computer network security / Social engineering / Zeus / Man-in-the-browser / International cybercrime / Identity theft / Transaction authentication number

RSA 2012 CYBERCRIME TRENDS REPORT The Current State of Cybercrime and What to Expect in 2012 Cybercrime continues to show no signs of slowing down. In fact, 2011 marked a year of new advanced threats and an increased lev

Add to Reading List

Source URL: www.cs.toronto.edu

Language: English - Date: 2012-05-28 11:33:54
904Security / Prevention / Computing / Data security / Crime prevention / Cryptography / Information governance / National security / ISO/IEC 27002 / Computer security / Information security / Professional certification

Mobilität und Leihpersonal als Security-Fallen:

Add to Reading List

Source URL: mk.cis-cert.com

Language: English - Date: 2010-09-02 08:03:20
905Cyberwarfare / Computer security / Security / Computing / International Multilateral Partnership Against Cyber Threats / Federal Information Security Management Act / National Cybersecurity Center of Excellence / Cyber-security regulation

Texas Commission Panelist and Speaker Statements

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2016-07-15 13:37:24
906Computer access control / Security / Prevention / Obfuscation / Password / Identity management / Cryptography / Password manager

Pico Gyazo Study – Information Sheet Who we are Pico is an ERC-funded project (grant StGbeing conducted at the University of Cambridge (UK). The Principal Investigator is Dr Frank Stajano. This study is being

Add to Reading List

Source URL: study.mypico.org

Language: English - Date: 2016-07-29 12:41:42
907Computer access control / Computer security / Cryptography / Security / Authentication / Password / Multi-factor authentication / Electronic authentication

ParentPaperwork Two Factor Authentication

Add to Reading List

Source URL: www.parentpaperwork.com

Language: English - Date: 2015-08-12 01:38:59
908Security / Prevention / Safety / Crime prevention / National security / Cryptography / Information governance / E-commerce / Information security / Computer security / Health Insurance Portability and Accountability Act / Payment Card Industry Data Security Standard

Microsoft Word - Facility Security Plan Standard.doc

Add to Reading List

Source URL: it.ouhsc.edu

Language: English - Date: 2013-02-19 08:45:20
909Software / Computing / System software / Cloud computing / Database / Cloud database / Filesystem-level encryption / Cloud computing security / Distributed file system for cloud

Distributed Independent Competitor Analysis and Access to Databases Encrypted Cloud Srikanth Bathini M.Tech, Dept of Computer Science Engineering, Prasad College of Engineering.

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2016-08-04 01:33:45
910Software / Computing / System software / Proxy servers / Internet privacy / Reverse proxy / Computer networking / Network performance / Microsoft Forefront Threat Management Gateway / Squid / Internet Information Services / Windows NT 4.0

Technical Research Paper Performance tests with the Microsoft Internet Security and Acceleration (ISA) Server Author:

Add to Reading List

Source URL: www.webperformance.com

Language: English - Date: 2005-12-20 21:05:41
UPDATE