Defensive computing

Results: 75



#Item
11Network architecture / Reverse domain hijacking / Domain name / Trademark / ICANN / Domain hijacking / Plaintiff / Whois / Uniform Domain-Name Dispute-Resolution Policy / Domain name system / Internet / Computing

“Brand Safe” Defensive names Agreement INTRODUCTION. In this Defensive Reservation Agreement (“Agreement”), “you” and “your” refer to each customer (“Customer”) and “we”, “us” and “our” re

Add to Reading List

Source URL: www.nic.coop

Language: English - Date: 2015-03-13 11:51:45
12Cyberwarfare / Hacking / Software testing / Source code / Vulnerability / Secure coding / Application security / Coding conventions / Defensive programming / Computing / Computer security / Computer programming

Secure Coding Initiative Jason A. Rafail Monday, May 14th, 2007 © 2007 Carnegie Mellon University

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-11 15:41:12
13Media technology / New media / Scientific revolution / Virtual reality / Computer virus / Technology / Espionage / Defensive computing / Public computer / Digital media / Digital technology / Internet

GUIDELINES FOR USE OF LIBRARY COMPUTER FACILITIES[removed].

Add to Reading List

Source URL: library.ipm.edu.mo

Language: English - Date: 2011-08-10 04:49:11
14Intellectual property law / Computing / VP8 / WebM / MPEG LA / Patent / Cross-licensing / License / Defensive termination / Patent law / Strategic alliances / Law

VP8 Patent Cross-license Agreement • Background ◦ 1. Goal ◦ 2. How to Become a VP8 Licensee • Agreement ◦ 3. License Grant by Google

Add to Reading List

Source URL: www.webm-ccl.org

Language: English
15Software bugs / Buffer overflow / Circular buffer / C / Stack buffer overflow / Defensive programming / Computing / Software engineering / Computer programming

Exception Handling Exception handling can help ameliorate the problem of indexing arrays outside their bounds. It allows the programmer to control what happens when an input string is too long. Exception handling is a

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-07-06 21:20:45
16Spamming / Malware / Internet Explorer / Email spam / Software / Proprietary software / Computing

Attackers Exploit Defensive Gaps Adversaries are committed to continually refining or developing new techniques that evade detection and hide malicious activity. Security teams must adapt their approach to protecting the

Add to Reading List

Source URL: www.cisco.com

Language: English
17National security / Technology / Computing / Internet / New media / Scientific revolution / Computer security / Defensive computing / Workplace surveillance / Security / Computer network security / Crime prevention

INDIGO SCAPE INTERNET MANAGEMENT SECURITY SOFTWARE SYSTEMS Manage and Monitor Internet Use, Restrict Access, Filter Websites and Content with Indigo Scape Surfing the Internet has become a favourite pastime of people of

Add to Reading List

Source URL: www.indigoscape.net

Language: English - Date: 2010-10-20 06:54:00
18National Safety Council / Computing / Software / Password / Defensive driving / Form

Employee Log in Instructions LOGIN INSTRUCTIONS TO ACCESS NATIONAL SAFETY COUNCIL DEFENSIVE DRIVING COURSE

Add to Reading List

Source URL: fire.ak.blm.gov

Language: English - Date: 2015-02-02 13:15:37
19Spamming / Internet / Spam filtering / Phishing / Social engineering / Computer virus / Antivirus software / Instant messaging / Defensive computing / Email / Computer-mediated communication / Computing

UNCLASSIFIED NCCIC ADVISORY National Cybersecurity & Communications Integration Center 2 MAY 2011 – 1400: OSAMA BIN LADEN – THEMED PHISHING

Add to Reading List

Source URL: www.pioncomm.net

Language: English - Date: 2015-03-09 14:54:45
20National security / Technology / Computing / Internet / New media / Scientific revolution / Computer security / Defensive computing / Workplace surveillance / Security / Computer network security / Crime prevention

INDIGO SCAPE INTERNET MANAGEMENT SECURITY SOFTWARE SYSTEMS Manage and Monitor Internet Use, Restrict Access, Filter Websites and Content with Indigo Scape Surfing the Internet has become a favourite pastime of people of

Add to Reading List

Source URL: www.indigosecure.com

Language: English - Date: 2010-10-20 06:54:00
UPDATE