Security Building

Results: 4307



#Item
191Software / System software / Computer architecture / Sandbox / Kernel / Systrace / Security-Enhanced Linux / Chroot / Operating system / Ptrace / Code injection / JavaScript

TxBox: Building Secure, Efficient Sandboxes with System Transactions Suman Jana The University of Texas at Austin Donald E. Porter

Add to Reading List

Source URL: www3.cs.stonybrook.edu

Language: English - Date: 2011-03-07 14:32:49
192

CASE STUDY When it comes to malware defense, Gilbane Building Company nails it Gilbane crushes malware and exploits on its endpoints with Malwarebytes Endpoint Security

Add to Reading List

Source URL: pl.malwarebytes.org

Language: English
    193

    August 26, 2014 Maine Women’s Policy Center Press Conference to Release Building a Prosperous Maine: A Roadmap to Economic Security for Women and Their Families Remarks by Paula Silsby

    Add to Reading List

    Source URL: mainewomenspolicycenter.org

    Language: English - Date: 2014-08-31 16:04:03
      194

      Solution brief Building an in-depth defense with Vectra and sandbox security Vectra® Networks is a leading innovator in the realtime, automated detection of in-progress cyber attacks. This solution brief examines how V

      Add to Reading List

      Source URL: www.vectranetworks.com

      Language: English - Date: 2016-02-05 10:52:59
        195

        Security BSidesLondon: Sponsorship Kit ... building security from the grassroots 3rd June 2015 ILEC Conference Centre 47 Lillie Road, London, SW6 1UD

        Add to Reading List

        Source URL: www.securitybsides.org.uk

        Language: English - Date: 2015-05-09 04:56:39
          196

          Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014), Auckland, New Zealand Formalising Human Recognition: a Fundamental Building Block for Security Proofs Kenneth Radke1

          Add to Reading List

          Source URL: manulis.eu

          Language: English - Date: 2014-10-20 07:27:39
            197

            THE DARK SIDE OF SECURITY BY OBSCURITY and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime Nicolas T. Courtois University College London, Computer Science, Gower street, WC1E 6BT, London, UK

            Add to Reading List

            Source URL: www.proxmark.org

            Language: English - Date: 2009-03-28 08:55:28
              198Business / Automatic identification and data capture / Radio-frequency identification / Economy / Humancomputer interaction / Logistics / Supply chain management / Ubiquitous computing / Track and trace / EPCglobal Network / EPCIS / Authentication

              Building Radio frequency IDentification for the Global Environment White Paper RFID Tag Security Authors: Manfred Aigner (TU Graz), Trevor Burbridge (BT

              Add to Reading List

              Source URL: cocoa.ethz.ch

              Language: English - Date: 2013-05-23 01:58:05
              199

              Family Economic Security (FES) Act Improving child well-being  Building family opportunity  Strengthening Minnesota   The economic security of a family is critical to the health and well-being of its children and

              Add to Reading List

              Source URL: www.cdf-mn.org

              Language: English - Date: 2015-08-31 20:10:13
                200Government / Prevention / Building engineering / Labour law / Social security / Unemployment benefits / Safety / Submittals / Office of Management and Budget / UI / Information security

                CLASSIFICATION EMPLOYMENT AND TRAINING ADMINISTRATION ADVISORY SYSTEM U.S. DEPARTMENT OF LABOR Washington, D.C

                Add to Reading List

                Source URL: ows.doleta.gov

                Language: English - Date: 2014-07-29 14:15:36
                UPDATE