Security software

Results: 17991



#Item
51

SOFTWARE SECURITY INVESTMENT: THE RIGHT AMOUNT OF A GOOD THING 1US Chad Heitzenrater1,2

Add to Reading List

Source URL: cybersec-prod.s3.amazonaws.com

- Date: 2016-12-06 15:49:44
    52

    DEVOPS: THE SECURITY GAP The evolution of cloud computing, SaaS and mobile apps has helped accelerate the transformation of how software is developed and released. It has highlighted the requirement for leaner, more agil

    Add to Reading List

    Source URL: public.brighttalk.com

    - Date: 2015-03-18 13:55:40
      53

      Security guarantees for the execution infrastructure of software applications Frank Piessens, Dominique Devriese, Jan Tobias Muehlberg, Raoul Strackx iMinds-DistriNet, KU Leuven

      Add to Reading List

      Source URL: cybersec-prod.s3.amazonaws.com

      - Date: 2016-12-07 14:32:11
        54

        Anti-Virus Comparative Performance Test Impact of Security Software on System Performance Language: English

        Add to Reading List

        Source URL: www.av-comparatives.org

        - Date: 2016-11-03 04:11:36
          55

          FRESCO: Modular Composable Security Services for Software-Defined Networks Seugwon Shin1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Guofei Gu1 , Mabry Tyson2 (1) Texas A&M University College Station, TX 7784

          Add to Reading List

          Source URL: faculty.cse.tamu.edu

          - Date: 2013-01-11 10:29:14
            56

            Enhancing Network Security through Software Defined Networking (SDN) Seungwon Shin Lei Xu, Sungmin Hong, Guofei Gu

            Add to Reading List

            Source URL: faculty.cs.tamu.edu

            - Date: 2016-06-07 22:10:44
              57

              Dell SonicWALL Enterprise Security 2.0 ™ ™

              Add to Reading List

              Source URL: software.dell.com

              - Date: 2016-03-11 09:32:30
                58

                Secure Coding for Real-Time Embedded Systems: Cert Run-Time Profile for Ada Mable Benjamin Georgia Tech Research Institute, Atlanta, GA Abstract— Safety and security in software coding is

                Add to Reading List

                Source URL: cybersec-prod.s3.amazonaws.com

                - Date: 2016-10-05 17:20:38
                  59

                  Success Story: CPU Tech Differentiating Its Security Hardware with Role- and Feature-Based Software Licensing and Entitlement Management Customer Profile: As a leading provider of anti-tamper processor solutions for the

                  Add to Reading List

                  Source URL: media.flexerasoftware.com

                  - Date: 2013-07-12 15:54:09
                    60

                    Network Performance Test Business Security Software Language: English August 2016 Last Revision: 11th October 2016

                    Add to Reading List

                    Source URL: www.av-comparatives.org

                    - Date: 2016-11-14 03:27:32
                      UPDATE