Computer security

Results: 47159



#Item
991Computer access control / Computer security / Computing / Security Assertion Markup Language / Single sign-on / Authentication / Spotfire / HTTP cookie / Identity provider / TIBCO Software

Business Team Busy Working Talking Concept

Add to Reading List

Source URL: spotfire.tibco.com

Language: English - Date: 2016-06-30 13:53:16
992Computing / Cyberwarfare / Computer security / Computer network security / Cross-site scripting / Hacking / Cross-site request forgery / JavaScript / SQL injection / Application security / Web application firewall

PREVOTY APPLICATION SECURITY MONITOR AND PROTECT YOUR APPLICATIONS AT RUNTIME For hackers, the money is in applications and the databases they access. For enterprises, the distributed, dynamic nature of applications and

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36
993Computing / Computer security / Computer networking / Trusted computing / Computer network security / Cyberwarfare / Data security / Firewall / Trusted Execution Technology / Network address translation / Trusted Platform Module / Packet processing

ETTM: A Scalable Fault Tolerant Network Manager Colin Dixon Hardeep Uppal Vjekoslav Brajkovic Dane Brandon Thomas Anderson Arvind Krishnamurthy University of Washington Abstract In this paper, we design, implement, and e

Add to Reading List

Source URL: colindixon.com

Language: English - Date: 2012-04-28 16:29:27
994Microsoft / Software / Computing / Email / End user / Outlook.com / Internet privacy / Dialog box

Improving Security Decisions with Polymorphic and Audited Dialogs José Carlos Brustoloni and Ricardo Villamarín-Salomón Department of Computer Science University of Pittsburgh

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-05-29 23:53:14
995Engineering / Systems science / Security / Systems engineering / Software quality / Occupations / Cyberwarfare / System of systems / Reliability engineering / Computer security / Military acquisition / Defense Technical Information Center

Inside the Beltway The ITEA Journal of Test and Evaluation 2016; 37: 10-16 Copyright © 2016 by the International Test and Evaluation Association Defense System Complexity: Engineering Challenges and Opportunities

Add to Reading List

Source URL: www.acq.osd.mil

Language: English - Date: 2016-04-15 16:55:43
996Privacy / Information privacy / Data security / Data protection / European Data Protection Supervisor / Personally identifiable information / Computer security / Government / General Data Protection Regulation / Data Protection Act

PDF Document

Add to Reading List

Source URL: european-space-solutions.eu

Language: English - Date: 2016-05-24 12:00:15
997Computing / Consumer electronics / Personal computing / Information appliances / Technology / Smartphones / GPS navigation devices / Personal digital assistants / Tablet computer / Touchscreen / Mobile device / Security token

Demo: User Identification and Authentication with Capacitive Touch Communication † Tam Vu† , Ashwin Ashok† , Akash Baid† , Marco Gruteser† ,

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2012-07-09 23:12:27
998Digital rights management / Malware / Computer security / Internet advertising / Computer network security / Identity theft / Rogue software / Spyware / Internet privacy / Origin / Web browser / Application software

Downloadable Software Guidelines Funmoods is committed to ethical standards for downloadable Downloadable Software Application ("Downloadable Software Application") and follows these guidelines: • No Downloadable Soft

Add to Reading List

Source URL: www.funmoods.com

Language: English - Date: 2013-01-24 10:11:01
999Security / Cyberwarfare / Prevention / Technology / Cybercrime / National security / Norbert Pohlmann / E-commerce / Emerging technologies / Internet / Computer security / Privacy

Welcome to ISSE / OID 2015 Norbert Pohlmann Chairman: IT security association TeleTrusT Professor: Westphalian University of Applied Sciences Director:

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-11-26 09:39:11
1000Computer security / Cyberwarfare / Security / Cybercrime / Computer network security / E-commerce / Antivirus software / Secure communication / Phishing / Malware / Computer worm / Trusteer

the importance of layered security_fin-01

Add to Reading List

Source URL: nl.malwarebytes.com

Language: English - Date: 2016-07-07 13:03:55
UPDATE