Computer security

Results: 47159



#Item
41

Privacy-supporting cloud-based conference systems: protocol and verification Myrto Arapinis, Sergiu Bursuc, Mark Ryan School of Computer Science, University of Birmingham Security of cloud computing

Add to Reading List

Source URL: www.cs.bham.ac.uk.

Language: English - Date: 2011-06-20 08:16:21
    42

    Ethics Building an Active Computer Security Ethics Community In spite of significant ethical challenges faced by

    Add to Reading List

    Source URL: nsrg.ece.illinois.edu

    Language: English - Date: 2018-06-11 12:51:20
      43

      IMPROVING SOFTWARE SECURITY WITH PRECISE STATIC AND RUNTIME ANALYSIS A DISSERTATION SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE

      Add to Reading List

      Source URL: www.doc.ic.ac.uk

      Language: English - Date: 2017-01-10 09:15:12
        44

        Subversion: The Neglected Aspect of Computer Security

        Add to Reading List

        Source URL: seclab.cs.ucdavis.edu

        - Date: 2006-01-16 10:12:53
          45

          Journal of Computer Security IOS Press draft printout, (17 Sep 2009), 1–20 1

          Add to Reading List

          Source URL: users.cis.fiu.edu

          Language: English - Date: 2009-09-17 08:17:02
            46

            2013 IEEE Symposium on Security and Privacy SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements Jeremy Clark and Paul C. van Oorschot School of Computer Science

            Add to Reading List

            Source URL: oaklandsok.github.io

            Language: English - Date: 2018-03-14 15:33:55
              47

              Teaching Computer Security Matt Bishop Department of Mathematics and Computer Science, Dartmouth College, 6188 Bradley Hall, Hanover, NHAbstract This paper describes three courses in computer security, and of

              Add to Reading List

              Source URL: seclab.cs.ucdavis.edu

              Language: English - Date: 2006-01-16 10:12:36
                48

                Computer Security Threat Monitoring and Surveillance

                Add to Reading List

                Source URL: seclab.cs.ucdavis.edu

                - Date: 2006-01-16 10:12:37
                  49

                  Managing Computer Security Incident Response Teams (CSIRTs) “Can you business survive and recover from network attacks and intruder threats?”

                  Add to Reading List

                  Source URL: www.pre-secure.com

                  Language: English - Date: 2002-11-01 16:30:46
                    UPDATE