Security software

Results: 17991



#Item
151Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Computer virus / Avira / Zero-day / IObit / Marcin Kleczynski

C A S E S T U DY CellNetix inoculates its workstations against malware Pathology company diagnoses and eliminates malware infections quickly and easily Business profile

Add to Reading List

Source URL: it.malwarebytes.com

Language: English - Date: 2016-07-07 18:37:33
152Computing / Telecommunications engineering / Data management / Fibre Channel / Internet Fibre Channel Protocol / ISCSI / Storage area network / XAM / Backup / Storage security / Software-defined storage

STORAGE NETWORKING CONCEPTS FOUNDATION Building a Working Knowledge of Storage Networking through a clear understanding of Solutions & Technology For professionals who require a comprehensive

Add to Reading List

Source URL: www.snia-sa.org

Language: English - Date: 2010-10-20 15:16:22
153Software testing / Computer security / Computing / Software engineering / Codenomicon / Fuzz testing / Oulu University Secure Programming Group / Denial-of-service attack / Test automation / Security testing / American fuzzy lop / Fault injection

Fuzzing Fuzzing: A Solution Chosen by the FDA to Investigate Detection of Software Vulnerabilities

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-07-06 08:58:36
154Software / Computer security / System software / Antivirus software / ESET / Malware / Computer virus / Avira / ESET NOD32

ESET® CASE STUDY Mercury Engineering “The biggest thing that stands out is its strong technical advantage over other products in the marketplace. ESET offers us reliable security, meaning that I can work on any proj

Add to Reading List

Source URL: cdn2-prodint.esetstatic.com

Language: English - Date: 2016-07-26 04:26:29
155Microsoft / Software / Webmail / Password / Security / Pass / Outlook.com / Round table

Updating Your ULA profile on Memberclicks 1. Go to this website to log in: https://ula.memberclicks.net/login?servId=3458 2a. If you  forgot  your  password,  click  “Forgot  your  password?”  It  will  tak

Add to Reading List

Source URL: ula.org

Language: English - Date: 2016-06-03 14:40:50
156Computing / Software / Computer access control / Prevention / Password / Security / Form / Portable Document Format / Login

Applicant Tutorial Foundant Grant Lifecycle Manager Overview This document is designed to provide grant applicants instructions for use of the Foundant Grant Lifecycle Manager application on The Kinsman Foundation websit

Add to Reading List

Source URL: kinsmanfoundation.org

Language: English - Date: 2011-07-24 21:14:23
157Computing / Computer network security / Computer security / Data security / Cyberwarfare / Firewall / Network management / Software / Transmission Control Protocol / Stateful firewall / Network address translation

Managed Security Service – Change Request Form (to be completed by customer) Explanation Notes: ALL sections must be completed and an authorizing Signature included on the SR Cover Application Form. 1-Net cannot

Add to Reading List

Source URL: 1-net.com.sg

Language: English - Date: 2015-12-30 21:07:38
158Technology / Economy / Business / Mobile telecommunications / Mobile payments / Samsung Pay / E-commerce / Contactless payment / Samsung Galaxy S6 / Near field communication / Samsung Electronics / Samsung

Abanca selects OT to deploy Samsung Pay in Europe Colombes, France, June 3, 2016 OT (Oberthur Technologies), a leading global provider of embedded security software products and services, and an award-winning innovator i

Add to Reading List

Source URL: www.oberthur.com

Language: English - Date: 2016-06-03 04:12:30
159Computing / Software / Network management / Information technology management / Internet Standards / Internet protocols / System administration / Computer systems / Syslog-ng / Syslog / Balabit / Logfile

syslog-ng Store Box PRODUCT DESCRIPTION CopyrightBalaBit IT Security All rights reserved.

Add to Reading List

Source URL: nextlog.it

Language: English - Date: 2014-05-07 13:40:47
160Software / System software / Utility software / Backup software / IBM PC compatibles / Disk file systems / Disk partitions / Backup / Data security / Disk partitioning / Disk formatting / Time Machine

How To Setup Time Machine on a Mac: 1. First, prepare a hard disk or Time Capsule unit for Time Machine Backup. You may use any drive to accomplish this whether it will be an internal or external drive makes no diff

Add to Reading List

Source URL: support.okstate.edu

Language: English - Date: 2013-07-02 14:38:07
UPDATE