Memory protection

Results: 165



#Item
31Terminate and Stay Resident / Truck driver / Professional certification / Cargo / Audit / Certification / Business / Standards / Technology / DOS memory management

TSR2014 TRUCKING SECURITY REQUIREMENTS © All rights reserved. Transported Asset Protection Association

Add to Reading List

Source URL: www.tapaemea.com

Language: English - Date: 2014-08-05 08:30:12
32Software bugs / C Standard Library / Computer errors / OpenBSD / Memory management / Buffer overflow protection / Buffer overflow / Stack buffer overflow / C dynamic memory allocation / Computing / Computer programming / Software engineering

CSRuntime Defenses Scribe Notes – Ashima Atul) Runtime Instrumentation Techniques All runtime instrumentation techniques protect the integrity of the application. They can be exploited by Denial-of-Servic

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42
33Operating system / Interrupt / Kernel / System call / Ring / Direct memory access / Transmission Control Protocol / INT / Process management / Computer architecture / Interrupts / X86 instructions

Version 1.0 Communication, Interrupts and Protection David May: March 24, 2014 Communication and Input-Output

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-25 07:06:21
34Machine code / X86 instructions / Central processing unit / Programming language implementation / X86 architecture / Vx32 / Google Native Client / X86 / Memory protection / Computer architecture / Computing / Software

BakerSFIeld: Bringing software fault isolation to x64 Drew Dean Computer Science Lab SRI International Menlo Park, CA, USA

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2014-04-28 13:57:15
35Operating system / Interrupt / Kernel / System call / Ring / Direct memory access / Transmission Control Protocol / INT / Process management / Computer architecture / Interrupts / X86 instructions

Version 1.0 Communication, Interrupts and Protection David May: March 24, 2014 Communication and Input-Output

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-25 07:06:21
36Conservation easement / Energy law / Real property law / Biology / Law / Land trust / Forest Legacy Program / Conservation biology / Farm and Ranch Lands Protection Program / Conservation in the United States / Environment / Agriculture in the United States

Your Family Land: Legacy or Memory? An Introduction to the Family Land Protection Process, NA-IN-01-09, Nov. 2008

Add to Reading List

Source URL: na.fs.fed.us

Language: English - Date: 2012-09-19 13:11:28
37Software engineering / C Standard Library / C dynamic memory allocation / Memory management / Heap spraying / Address space layout randomization / Heap feng shui / Alexander Sotirov / Buffer overflow protection / Computing / Computer programming / Software bugs

Advanced Heap Manipulation in Windows 8 Zhenhua(Eric) Liu VERSION 1.2 Contents

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-04-01 08:11:01
38Linux / Kernel / X86 memory segmentation / Ring / Memory protection / General protection fault / Linux-VServer / System call / Operating system / Computer architecture / System software / Software

The Cake is a Lie: Privilege Rings as a Policy Resource Sergey Bratus1 , Peter C. Johnson1 , Michael E. Locasto2 , Ashwin Ramaswamy1 , and Sean W. Smith1 1 2 Dartmouth College

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2009-09-03 12:12:14
39Software bugs / Data types / Computer errors / Primitive types / Arrays / Buffer overflow protection / Buffer overflow / Stack buffer overflow / Memory safety / Computing / Software engineering / Computer programming

A Practical Dynamic Buffer Overflow Detector Olatunji Ruwase Monica S. Lam Transmeta Corporation

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:32
40Computer virus / Malware / VM / Hypervisor / VirusTotal.com / NProtect GameGuard Personal / Real-time protection / System software / Antivirus software / Software

Computer Science SEER: Practical Memory Virus Scanning-as-a-Service for Virtualized Environments Jason Gionta, Ahmed Azab,

Add to Reading List

Source URL: gionta.org

Language: English - Date: 2014-12-11 10:19:04
UPDATE