Plug computer

Results: 495



#Item
51Plug and play / Autoconfig / Micro Channel architecture / PCI configuration space / Conventional PCI / Computer hardware / Computer buses / Industry Standard Architecture

RTF Document

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2005-06-07 19:44:13
52Software testing / Security / Hacking / Vulnerability / Attack / Password / Security risk / Social engineering / RSA / Computer network security / Cyberwarfare / Computer security

TRESPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis Wolter Pieters∗† , Dina Hadˇziosmanovi´c∗ , Aleksandr Lenin‡ , Lorena Montoya† , and Jan Willemson‡ ∗ Delft University of Technology,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-05-07 16:20:44
53Cross-site scripting / SQL injection / Plug-in / JavaScript / Application security / Cloud computing / Cross-site request forgery / ArcSight / Computing / Cyberwarfare / Computer security

PREVOTY RUNTIME APPLICATION SECURITY Applications, and the databases that they access, are at the heart of most enterprises business and hackers know that’s where the money is, including usernames, passwords, personal

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2015-06-04 23:45:18
54Cross-site scripting / SQL injection / Plug-in / JavaScript / Application security / Cloud computing / Cross-site request forgery / ArcSight / Computing / Cyberwarfare / Computer security

PREVOTY RUNTIME APPLICATION SECURITY Applications, and the databases that they access, are at the heart of most enterprises business and hackers know that’s where the money is, including usernames, passwords, personal

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2015-06-04 23:45:18
55Free software licenses / Open content / Free content / Copyleft / Proprietary software / GNU General Public License / End-user license agreement / Free software / Frameworx License / Software licenses / Computer law / Law

Microsoft Word - PKG-met_cloud_plug_SDK_EULA-2014_05_28.docx

Add to Reading List

Source URL: www.metaio.com

Language: English - Date: 2015-05-07 04:37:18
56Network protocols / Computer networking / Wireless / Home automation / Wireless networking / ZigBee / Universal Plug and Play / Ambient intelligence / Framework Programmes for Research and Technological Development / Computing / Technology / Building engineering

Creating the Smart Home for All of Us. Together. Connected Living The objective of the Connected Living innovation center is promoting and developing innovative ­solutions across industries and manufacturers for intuit

Add to Reading List

Source URL: www.connected-living.org

Language: English - Date: 2014-11-17 11:17:41
57Software testing / Computer network security / Cross-site scripting / Cross-site request forgery / Plug-in / Application security / Penetration test / Vulnerability / SQL injection / Cyberwarfare / Computer security / Computing

Prevoty Plug-ins: Application Security for Legacy Applications The frequency and impact of hacking attempts against websites and applications continue to rise to unprecedented levels, creating significant challenges for

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2015-06-04 23:45:13
584GL / XQuery / JQuery / Google Chrome / Plug-in / Firefox / Software / Computing / Functional languages

The Systems Group at ETH Zurich © Department of Computer Science | ETH Zürich XQuery in the Browser

Add to Reading List

Source URL: archive.xmlprague.cz

Language: English - Date: 2010-04-12 17:35:54
59Software testing / Computer network security / Cross-site scripting / Cross-site request forgery / Plug-in / Application security / Penetration test / Vulnerability / SQL injection / Cyberwarfare / Computer security / Computing

Prevoty Plug-ins: Application Security for Legacy Applications The frequency and impact of hacking attempts against websites and applications continue to rise to unprecedented levels, creating significant challenges for

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2015-06-04 23:45:13
60Deep packet inspection / Plug-in / Netronome / Packet Processing / Embedded system / Plex / Boxee / Application-level gateway / Software / Computing / Computer network security

Product Datasheet Qosmos ixEngine®: Embedded DPI Engine Qosmos ixEngine is the market leading network intelligence engine. More than 70% of networking vendors and ISVs who have decided to outsource DPI technology have

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-05-28 10:26:38
UPDATE