Protect Software

Results: 516



#Item
241Web hosting / User interfaces / Web applications / Java enterprise platform / Plesk / PHP programming language / Horde / Control panel / Parallels Plesk Billing / World Wide Web / Computing / Software

Plesk 12 ServerShield installation guide for every Server Owner CloudFlare ServerShield CloudFlare ServerShield™, a complete security solution that enables server administrators and websites owners to protect and speed

Add to Reading List

Source URL: www.cloudflare.com

Language: English - Date: 2015-02-20 21:31:04
242Evaluation / Technology / Radiographic testing / Computed radiography / International Atomic Energy Agency / Industrial radiography / Inspection / Software development process / Nondestructive testing / Radiography / Science

Controlling the risk due to the use of gamma sources for NDT First feedback from the deployment of replacement NDT Techniques Etienne MARTIN (COFREND, France) IAEA Conference Vienna December[removed]Enhancing the protect

Add to Reading List

Source URL: www-ns.iaea.org

Language: English - Date: 2014-12-02 10:29:38
243Network architecture / Domain Name System Security Extensions / Name server / Dan Kaminsky / PROTECT IP Act / DNS spoofing / Comparison of DNS server software / Domain name system / Internet / Computing

Security and Other Technical Concerns Raised by the DNS Filtering Requirements in the PROTECT IP Bill May 2011 Authors:

Add to Reading List

Source URL: domainincite.com

Language: English - Date: 2011-05-26 11:10:44
244Computer security / Computing / Computer architecture / NonStop / Security / Encryption / HP StorageWorks / Backup / HP Data Protector / Disk encryption / Cryptography / Cryptographic software

HP NonStop Volume Level Encryption Data sheet More than 20,000 security standards have emerged worldwide and nearly all include requirements to protect data-at-rest from exposure by theft or media

Add to Reading List

Source URL: h20195.www2.hp.com

Language: English
245Computer security / Spyware / Malware / Internet security / Computer worm / ZoneAlarm / Computer virus / Norton Internet Security / Trend Micro Internet Security / System software / Software / Antivirus software

How to Protect Your Family’s PC A comprehensive guide from the creators of the award-winning ZoneAlarm® Internet Security Suite by Check Point

Add to Reading List

Source URL: download.zonealarm.com

Language: English - Date: 2007-09-12 16:53:30
246Disk file systems / File system API / Virtual file system / Kernel / Filesystem in Userspace / Linux kernel / Microkernel / File system / Ext2 / System software / Software / Computer architecture

1 Trust in a Principled Filesystem Kevin Walsh and Fred B. Schneider Abstract—Users typically have little reason to trust that systems will protect user data against unauthorized access. A prototype filesystem stack w

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2014-06-13 22:37:28
247ITunes / IPhone / Smartphones / IOS / Multi-touch / Security token / IPad / ICloud / App Store / Software / Apple Inc. / Computing

Deploying iPhone and iPad Security Overview iOS, the operating system at the core of iPhone and iPad, is built upon layers of security. This enables iPhone and iPad to securely access corporate services and protect impor

Add to Reading List

Source URL: images.apple.com

Language: English - Date: 2013-09-30 04:06:07
248Anti-spam / Carnegie Mellon University / Crowdsourcing / Human-based computation / ReCAPTCHA / IBM DeveloperWorks / IBM i / CAPTCHA / Eclipse / Software / Computing / Java platform

Protect your site from bots with reCAPTCHA on Bluemix Store user data in an IBM Bluemix SQL database Pradeep Padmarjaiah (https://www.ibm.com/ developerworks/community/profiles/html/ profileView.do?key=b23aea8c-39d9-428f

Add to Reading List

Source URL: www.ibm.com

Language: English - Date: 2015-01-07 17:34:50
249Data management / Ingres / Database / Computing / Data / Database management systems / Cross-platform software / Relational database management systems

REMOTE DBA Remote Database Administration Service Protect your business applications from hardware failure and disasters; increase your online availability with high availability from Actian. Ingres Remote DBA

Add to Reading List

Source URL: supportservices.actian.com

Language: English - Date: 2011-12-03 19:51:21
250Biological databases / National Institutes of Health / BLAST / Public domain software / Sequence database / GenBank / Sequence alignment / Warren Gish / Science / Bioinformatics / Computational phylogenetics

Why people pay for IP sequence searching If you’re looking to protect your own sequences or want to make sure you’re not infringing on anyone else’s IP then you need to review what’s already out there. Anyone who

Add to Reading List

Source URL: resources.genomequest.com

Language: English - Date: 2014-10-29 15:12:37
UPDATE