Java security

Results: 406



#Item
101Hacking / Software testing / Vulnerability / Java / Google App Engine / Implied warranty / Security / Warranty / Computing / Contract law / Computer security

Security Vulnerability Notice SEGOOGLE-6 [Google App Engine Java security sandbox bypasses, Issue 41] DISCLAIMER INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT

Add to Reading List

Source URL: www.security-explorations.com

Language: English - Date: 2015-05-15 02:13:23
102Cloud infrastructure / Hybrid cloud / Intelligent workload management / Kaavo / Java enterprise platform / Cloud computing / Centralized computing / Computing

APCERA.COM Hybrid Cloud Operating System Apcera’s Hybrid Cloud OS: The Security and Freedom IT Demands. The Speed Developers Love The modern enterprise operates in a complex world, which requires that IT and developer

Add to Reading List

Source URL: www.apcera.com

Language: English - Date: 2015-06-08 12:33:45
103MIDlet / S0 / Filesystem permissions / Connected Limited Device Configuration / Java Platform /  Micro Edition / Computing / Java specification requests / Mobile Information Device Profile

A Formal Specification of the MIDP 2.0 Security Model Santiago Zanella B´eguelin1,2 , Gustavo Betarte3 , and Carlos Luna3 1 2

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
104Computing / Windows Vista / Software / Java enterprise platform / Identity management / Security Assertion Markup Language / System software

http://www.greencloudsonline.com/3630-release-1-14-greenclouds-releases-online-scalingadvanced-security-and-sso-features/ Release 1.14: Greenclouds releases online scaling, advanced security and SSO features March 29, 20

Add to Reading List

Source URL: www.icoscapital.com

Language: English - Date: 2013-10-31 04:14:25
105Cross-platform software / Vulnerability / Pointer / Computer insecurity / Java / C / Software / Software bug / Computing / Software engineering / Computer programming

Building Code for Medical Device Software Security Tom Haigh and Carl Landwehr READ ON!

Add to Reading List

Source URL: cybersecurity.ieee.org

Language: English - Date: 2015-05-01 08:08:57
106

Brèves 2015 S13-S14 – La mare du Gof Actus Sécurité Grand public => Flash in. «The shift to Flash was not surprising. Of the favorite browser targets, Java and IE both received security mitigation

Add to Reading List

Source URL: lamaredugof.fr

Language: English - Date: 2015-04-06 08:18:09
    107Cryptographic protocols / Key management / Secure communication / Electronic commerce / Transport Layer Security / HTTP Secure / Public key certificate / X.509 / Java version history / Cryptography / Computing / Public-key cryptography

    Magdeburger Journal zur Sicherheitsforschung Gegründet 2011 | ISSN: Herausgegeben von Stefan Schumacher und Jörg Sambleben Erschienen im Magdeburger Institut für Sicherheitsforschung This article appears in

    Add to Reading List

    Source URL: www.sicherheitsforschung-magdeburg.de

    Language: English - Date: 2015-03-20 16:20:14
    108Formal specification / Specification / Technology / Management / Form / Java specification requests / Formal methods / Mobile Information Device Profile

    Motivation Specification Verification Refinement A Formal Specification of the MIDP 2.0 Security Model 1 ´

    Add to Reading List

    Source URL: software.imdea.org

    Language: English - Date: 2013-03-13 12:33:24
    109Android / Mobile operating system / Samsung Galaxy S / Java / Android Market / Computing / Smartphones / Software

    Android OEM’s applications (in)security and backdoors without permission Andr´ e Moulu

    Add to Reading List

    Source URL: www.quarkslab.com

    Language: English - Date: 2013-07-15 08:52:42
    110Cloud infrastructure / Hybrid cloud / Intelligent workload management / Kaavo / Java enterprise platform / Cloud computing / Centralized computing / Computing

    APCERA.COM Hybrid Cloud Operating System Apcera’s Hybrid Cloud OS: The Security and Freedom IT Demands. The Speed Developers Love The modern enterprise operates in a complex world, which requires that IT and developer

    Add to Reading List

    Source URL: www.apcera.com

    Language: English - Date: 2015-06-03 14:15:44
    UPDATE