Security University

Results: 12075



#Item
761Antivirus software / Malwarebytes / Malware / Computer virus / Zero-day / Avira / Rogue security software / IObit / Bleeping Computer

C A S E S T U DY Imperial College gives malware a failing grade With Malwarebytes Anti-Malware for Business, the university proactively protects valuable intellectual property on thousands of PCs

Add to Reading List

Source URL: it.malwarebytes.com

Language: English - Date: 2016-07-07 18:37:33
762Parliamentary procedure / Committees / Meetings / Majority / Political terminology / Quorum / United States House of Representatives / Board of directors / Proxy voting / Public Interest Declassification Board / Interagency Security Classification Appeals Panel

Department of Dance College of the Arts Kennesaw State University BYLAWS Dated:

Add to Reading List

Source URL: cota.kennesaw.edu

Language: English - Date: 2015-03-18 15:30:39
763Johnson City /  Tennessee / Law enforcement in the United States / East Tennessee State University / Department of Public Safety / Campus police / Public safety organizations / East Tennessee State University DPS

ANNUAL SECURITY & FIRE SAFETY REPORTCrime and Fire Statistics for 2012, 2013, and 2014 Pa g e |1

Add to Reading List

Source URL: www.etsu.edu

Language: English - Date: 2015-12-11 09:55:44
764Surveillance / Video content analysis / Time-lapse photography / Video surveillance / Road traffic management

Real-time Implementation of Automated Counter-flow Detection in Airport Security Exits Mohamed A. Elgharib, Venkatesh Saligrama Boston University 1. Objective

Add to Reading List

Source URL: www.northeastern.edu

Language: English - Date: 2013-10-03 14:18:04
765Deep packet inspection / Computer network security / Net neutrality / Internet censorship in China / DPI / Dots per inch / Deep content inspection / Network intelligence

DPI Technology from the standpoint of Internet governance studies: An introduction Dr. Milton Mueller, Syracuse University School of Information Studies What is DPI? A study of whether and how DPI technology disrupts Int

Add to Reading List

Source URL: dpi.ischool.syr.edu

Language: English - Date: 2011-11-28 11:52:02
766Smartphones / Android / Mobile operating systems / Alphabet Inc. / Mobile security / Google Play / Mobile app / App store / 17 / IOS / IOS version history

Detecting Passive Content Leaks and Pollution in Android Applications Yajin Zhou Xuxian Jiang Department of Computer Science North Carolina State University yajin

Add to Reading List

Source URL: yajin.org

Language: English
767Computer network security / Wireless networking / Deep packet capture / Packet analyzer / Pcap / Transmission Control Protocol / Wireshark / Raw socket / Ping / Tcpdump / Packet injection / Packetsquare

Laboratory for Computer Security Education 1 Packet Sniffing and Spoofing Lab cWenliang Du, Syracuse University.

Add to Reading List

Source URL: www.cis.syr.edu

Language: English - Date: 2010-01-06 15:07:49
768Law enforcement in the United States / United States Department of Homeland Security / Transportation Security Administration / U.S. Immigration and Customs Enforcement / Homeland security / Port security / Homeland Security Centers of Excellence / Federal Air Marshal Service / United States Coast Guard / Erroll Southers / Arif Alikhan

National Center for Risk and Economic Analysis of Terrorism Events (CREATE) A DHS Science and Technology Center of Excellence University of

Add to Reading List

Source URL: web-oup.s3-fips-us-gov-west-1.amazonaws.com

Language: English - Date: 2016-05-06 11:16:24
769Domain name system / Internet protocols / Internet Standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Denial-of-service attack / Name server / Localhost / DNS spoofing / Google Public DNS

University of Amsterdam System & Network Engineering RP1 Defending against DNS reflection amplification attacks February 14, 2013

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2013-02-14 04:49:27
770University of Waterloo / University of Saskatchewan / Waterloo /  Ontario / McMaster University / Dalhousie University

Media Advisory/Photo and Interview Opportunity July 28 Students at Prestigious SHAD Program Showcase Innovative Solutions to Food Security in Canada at 12 SHAD Host University Campuses from coast to coast What happens w

Add to Reading List

Source URL: www.shad.ca

Language: English - Date: 2016-07-27 14:27:38
UPDATE