Defensive computing

Results: 75



#Item
51Computer law / Internet privacy / Computer network / Email / World Wide Web / Data discrimination / Defensive computing / Technology / Digital media / Internet

COMPUTER TECHNOLOGY AND NETWORKS Policy/Guidelines

Add to Reading List

Source URL: msbo.org

Language: English - Date: 2011-12-15 17:04:53
52Malware / Smartphone / IOS jailbreaking / Opera / Phishing / Defensive computing / Web threat / Software / Computing / Antivirus software

Microsoft Word[removed]Branded

Add to Reading List

Source URL: www.dhses.ny.gov

Language: English - Date: 2014-07-08 09:23:57
53System software / Malware / Antivirus software / IOS jailbreaking / Android / Rooting / Defensive computing / Mobile business intelligence / Computing / Smartphones / Software

From the Desk of [Insert Name Here] Is Malware a Threat to Mobile Devices? The volume of cyber threats to mobile computing devices continues to increase as new applications and devices proliferate. McAfee reports that t

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-05-29 06:25:24
54Cyberwarfare / Computer security / Computer virus / Web threat / Defensive computing / Computer network security / Security / Malware

Microsoft Word - Drive-by Downloads.docx

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2012-12-19 17:47:49
55Embedded Linux / Malware / Antivirus software / IOS jailbreaking / Android / Opera / Defensive computing / Mobile business intelligence / Software / Computing / Smartphones

May 2014 Volume 9, Issue 5 Protecting Against Mobile Malware Center for Internet Security

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-06-03 14:16:07
56Procedural programming languages / SAS / Hard coding / ALGOL 68 / C / Expect / SAS language / Software engineering / Computing / Computer programming

Defensive Programming, Avoiding the Big Mistakes

Add to Reading List

Source URL: www.pharmasug.org

Language: English - Date: 2014-05-28 21:47:28
57Computing / Cyberwarfare / Vulnerability / Electronic voting / Security testing / Social vulnerability / Voting machine / Defensive programming / Code review / Software testing / Computer security / Security

The Red Team penetration test for the InkaVote Plus was conducted by

Add to Reading List

Source URL: www.sos.ca.gov

Language: English - Date: 2011-05-14 16:41:08
58System software / Malware / Antivirus software / Android / IOS jailbreaking / Rooting / Defensive computing / Mobile virus / Computing / Smartphones / Software

May 2014 MONTHLY Cyber Security Newsletter

Add to Reading List

Source URL: www.its.ms.gov

Language: English - Date: 2014-08-01 12:46:33
59Malware / Cybercrime / Smartphone / IOS jailbreaking / Mobile device / Phishing / Mobile business intelligence / Defensive computing / Information appliances / Computing / Technology

Microsoft Word[removed]template.docx

Add to Reading List

Source URL: www.nd.gov

Language: English - Date: 2014-05-30 15:42:48
60Spamming / Internet / Spam filtering / Phishing / Social engineering / Computer virus / Antivirus software / Instant messaging / Defensive computing / Email / Computer-mediated communication / Computing

UNCLASSIFIED NCCIC ADVISORY National Cybersecurity & Communications Integration Center 2 MAY 2011 – 1400: OSAMA BIN LADEN – THEMED PHISHING

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-10-07 21:38:32
UPDATE