Defensive computing

Results: 75



#Item
21National security / Electronic commerce / Secure communication / Computing / Software engineering / Computer security / Application security / Penetration test / Defensive programming / Computer network security / Security / Crime prevention

Wouldn’t it be Nice …? secure enough for Paul E. Black secure enough

Add to Reading List

Source URL: buildsecurityin.us-cert.gov

Language: English - Date: 2013-05-15 07:43:19
22Cyberwarfare / Computer security / Computer virus / Web threat / Defensive computing / Computer network security / Security / Malware

Microsoft Word - Drive-by Downloads.docx

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2012-12-19 17:47:49
23Computing / Internet security / Network security / Firewall / Malware / Information security / Computer network / Wireless security / Defensive computing / Computer network security / Computer security / Security

  Information Security Animations – Network and Communication Security (I) (Script) Network and Communication Security (I)

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-02-24 20:59:08
24Computing / Internet security / Network security / Firewall / Malware / Information security / Computer network / Wireless security / Defensive computing / Computer network security / Computer security / Security

  Information Security Animations – Network and Communication Security (I) (Script) Network and Communication Security (I)

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-03-29 08:16:27
25System software / Software / Malware / Computer virus / Email / Network security / Computer security / Defensive computing / Internet security / Antivirus software / Computer network security / Computing

seniors online security Computer Security 1 of 5 training guides available An Australian Government Initiative

Add to Reading List

Source URL: www.scamnet.wa.gov.au

Language: English - Date: 2014-07-16 00:16:18
26Computing / Botnet / Denial-of-service attack / Identity theft / Password / Information warfare / Threat / War / Malware / Computer network security / Cyberwarfare / Computer security

Conducting Defensive Information Warfare on Open Platforms 23rd October 2013 – LinuxCon Europe Ben Tullis – (formerly of) LinuxIT (Europe) Ltd.

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2013-10-19 16:33:05
27Internet / Internet privacy / Network service / Privacy / Defensive computing / Network security / Computing / Email / Ethics

PS No. 65 Effective: June 8, 1998 (Revised) Page 5 of 7 ________________________________________________________________

Add to Reading List

Source URL: web.lsue.edu

Language: English - Date: 2013-09-12 14:41:00
28Computing / Exception handling / New / Defensive programming / Exception handling syntax / Exception chaining / Software engineering / Control flow / Computer programming

SHIELDS UP! DEFENSIVE CODING IN C# Presented by Jeremy Clark www.jeremybytes.com

Add to Reading List

Source URL: www.jeremybytes.com

Language: English - Date: 2014-04-07 16:43:45
29Software bugs / Buffer overflow / Memory safety / Stack buffer overflow / Circular buffer / Splint / C string handling / Defensive programming / C standard library / Computing / Computer programming / Software engineering

Statically Detecting Likely Buffer Overflow Vulnerabilities David Larochelle [removed] University of Virginia, Department of Computer Science David Evans [removed]

Add to Reading List

Source URL: lclint.cs.virginia.edu

Language: English - Date: 2001-12-31 15:21:50
30Blog hosting services / Social information processing / Web 2.0 / Defensive driving / Risk management / Allstate / New Jersey / Facebook / World Wide Web / Software / Computing

BIANJ Letterhead CMYK_with_footer_resized_logo

Add to Reading List

Source URL: www.ugotbrains.com

Language: English - Date: 2014-12-01 16:46:46
UPDATE