Macro and security

Results: 33



#Item
11Markup languages / Open formats / OpenDocument / OpenOffice.org / Portable software / Malware / Microsoft Word / Document file format / Macro / Software / Computing / Computer file formats

OpenOffice v3.x Security Design Weaknesses Eric Filiol and Jean-Paul Fizaine ESIEA Laboratoire de virologie et de cryptologie op´erationnelles 38 rue des Dr Calmette et Gu´erin, Laval, France ,fiz

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
12Employment compensation / Investment / Pension / Personal finance / Social Security / Disability pension / Employment / Finance / Financial services / Retirement / Financial economics

Annex 1, Table 1 Table 1: Reporting table for the assessment of CSRs and key macro-structural reforms Table 1. Description of the measures taken and information on their qualitative impact Information on planned and alre

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2015-05-13 05:00:50
13Markup languages / Open formats / OpenDocument / OpenOffice.org / Portable software / Malware / Microsoft Word / Document file format / Macro / Software / Computing / Computer file formats

OpenOffice v3.x Security Design Weaknesses Eric Filiol and Jean-Paul Fizaine ESIEA Laboratoire de virologie et de cryptologie op´erationnelles 38 rue des Dr Calmette et Gu´erin, Laval, France ,fiz

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
14System administration / Workflow technology / Information technology management / Software / Workflow / Macro / Computing / Data security / Splunk

Creating Splunk 6.2 Knowledge Objects Are you in charge of creating Splunk knowledge objects for your organization? Then you will benefit from this six-hour course that walks you through the various knowledge objects and

Add to Reading List

Source URL: www.splunk.com

Language: English - Date: 2014-11-12 16:43:21
15Computer network security / Tunneling protocols / Virtual private networks / Internet privacy / Internet protocols / OpenVPN / Proxy server / IPsec / RADIUS / Computing / System software / Network architecture

Security with Passion www.endian.com Endian UTM Macro 250 and 500 The new generation of UTM hardware appliances

Add to Reading List

Source URL: www.endian.com

Language: English - Date: 2015-04-09 11:35:41
16Malware / Antivirus software / Computer network security / Social Security Administration / Macro virus / Static single assignment form / Computer security / Virus hoax / Computer worm / System software / Computer viruses / Software

Chapter 16. Security Incident Identification, Reporting and Resolution 7 Chapter 16. Security Incident Identification, Reporting and Resolution

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
17Internet protocols / Tunneling protocols / Virtual private networks / Computer network security / Internet standards / OpenVPN / IPsec / RADIUS / Transport Layer Security / Computing / Network architecture / Internet

Security with Passion www.endian.com Endian UTM Macro 1000 and 2500 The new generation of UTM hardware appliances

Add to Reading List

Source URL: www.endian.com

Language: English - Date: 2015-04-09 11:35:41
18Economics / Finance / Investment / Pension / Defined benefit pension plan / Social Security / Pensions in Chile / Pensions in Norway / Financial services / Employment compensation / Financial economics

PRC International Conference on Pensions in Asia: Incentives, Compliance and Their Role in Retirement A Macro Analysis of China Pension Pooling System Incentive Issues and Financial Problem

Add to Reading List

Source URL: cis.ier.hit-u.ac.jp

Language: English - Date: 2014-07-01 09:04:06
19Environment / Agriculture in India / Food security / Agriculture / Economics / World food price crisis / Afghanistan Public Policy Research Organization / Food politics / Food and drink / Australian Centre for International Agricultural Research

Agricultural Development Policy Research Program Strategy Global context/trends Agricultural development operates in both the micro and macro dimensions. Supportive policy initiatives are a central component linking the

Add to Reading List

Source URL: aciar.gov.au

Language: English - Date: 2014-01-14 00:03:41
20Software / Antivirus software / Computer viruses / Rogue software / Macro virus / Spyware / Real-time protection / Computer worm / Botnet / System software / Malware / Computer network security

InfoSec – FAQs Protection from Virus and Malicious Codes 1.

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2009-06-15 09:06:09
UPDATE