Protect Software

Results: 516



#Item
221Shavlik Technologies / Severnside / Patch / LANDesk / Vulnerability / Affordable housing / System software / Software / Computing

Shavlik® Success Story: Severnside Housing Severnside Housing Severnside Housing Enhances Security and Safeguards Service Quality with Shavlik Protect

Add to Reading List

Source URL: rs.shavlik.com

Language: English - Date: 1999-12-31 19:00:00
222IPhone / Cloud clients / IOS / Covenant Eyes / App Store / The Filter / Google Chrome / Opera / IPad / Software / ITunes / Smartphones

Protect Your Devices with Covenant Eyes

Add to Reading List

Source URL: www.covenanteyes.com

Language: English - Date: 2014-04-22 12:10:37
223Corporate governance / Auditing / Business / Audit / Business software / Regulatory risk differentiation

REGULATORY PHILOSOPHY Customs is a regulatory agency with a clear mandate to protect the Australian community from the illegal movement of goods and people across our border and to collect customs and other revenue. We

Add to Reading List

Source URL: customs.gov.au

Language: English - Date: 2004-12-07 21:37:20
224Computer security / Cyberwarfare / Social engineering / Spamming / Computer network security / Phishing / Threat / Web threat / Linux malware / Antivirus software / Cybercrime / Malware

SOLUTION BRIEF Versafe TotALL™ Online Fraud Protection Suite Protect

Add to Reading List

Source URL: www.commsnet.com.au

Language: English - Date: 2013-08-06 19:29:30
225Corporate governance / Auditing / Business / Audit / Business software / Regulatory risk differentiation

REGULATORY PHILOSOPHY Customs is a regulatory agency with a clear mandate to protect the Australian community from the illegal movement of goods and people across our border and to collect customs and other revenue. We

Add to Reading List

Source URL: www.customs.gov.au

Language: English - Date: 2004-12-07 21:37:20
226Cross-platform software / Java virtual machine / Java Web Start / Java version history / Java applet / Java / Applet / Browser exploit / Computing / Software / Java platform

PROTECT - Minimising the threat from java-based intrusions

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2014-07-02 03:06:48
227Graphic design / Product management / Brand / Trademark / TM / Marketing / Brand management / Communication design

Using Trademarks to Protect FLOSS Communities Tony Sebro Software Freedom Conservancy

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2015-02-25 14:20:24
228Cyberwarfare / Comodo / Information privacy / Certificate authority / Computing / Computer security / Data loss prevention software / Comodo Group

Protect Your Valuable Data with MyDLP MyDLP from Comodo is the fastest, most scalable and feature-rich solution for Data Loss Prevention This document is for informational purposes only and may contain typographical err

Add to Reading List

Source URL: enterprise.comodo.com

Language: English - Date: 2014-11-23 21:05:50
229Internet privacy / Computing / Antivirus software / Malware / Avira

www.ebankingbutsecure.ch How to protect yourself on social networks? Personal information The basic idea behind social media and networks is sharing information, photos and other personal details with «friends». Howev

Add to Reading List

Source URL: www.ebankingabersicher.ch

Language: English - Date: 2014-06-06 04:21:22
230Computer security / ESET NOD32 / BitDefender / Avast! / ESET / BullGuard / AVG Technologies / Webroot Software / Avira / Antivirus software / Software / System software

Virus & Malicious Code Anti-virus Software, Malicious Code Detection Tools and Internet Security Suites Anti-virus software and malicious code detection tools are commonly used to protect information systems from malicio

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2014-07-22 05:05:37
UPDATE