Security software

Results: 17991



#Item
71

Derivation of Domain-specific Architectural Knowledge Views from Governance and Security Compliance Metadata Huy Tran, Ioanna Lytra, Uwe Zdun Software Architecture Research Group University of Vienna, Austria E-Mail: fir

Add to Reading List

Source URL: eprints.cs.univie.ac.at

- Date: 2013-12-19 04:46:07
    72

    Security Model in .NET Framework Mikhail Shcherbakov senior software developer Positive Technologies

    Add to Reading List

    Source URL: public.jugru.org

    - Date: 2016-07-11 04:56:47
      73

      Published in Software Safety and Security; Tools for Analysis and Verification. NATO Science for Peace and Security Series, vol 33, pp286-318, 2012 A Primer on Separation Logic (and Automatic Program Verification and Ana

      Add to Reading List

      Source URL: www.lsv.ens-cachan.fr

      - Date: 2014-03-02 08:55:00
        74

        Workshop to Develop a Building Code and Research Agenda For Medical Device Software Security Carl Landwehr January 8, 2015

        Add to Reading List

        Source URL: www.landwehr.org

        - Date: 2015-07-23 13:16:14
          75

          Electronic Health Record Software Required Security Features and Recommendations for Technical Specifications of Single Source Contracts and RFI for the Behavioral Health Information Technology Grant Scope: the scope of

          Add to Reading List

          Source URL: fphny.org

          - Date: 2016-04-29 15:58:09
            76

            1 Security Reporting for Infor-Lawson Software Agenda

            Add to Reading List

            Source URL: www.kinsey.com

            - Date: 2016-01-13 16:48:41
              77

              ITL BULLETIN FOR JULY 2016 IMPROVING SECURITY AND SOFTWARE MANAGEMENT THROUGH THE USE OF SWID TAGS David Waltermire, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory

              Add to Reading List

              Source URL: csrc.nist.gov

              - Date: 2016-08-23 14:55:14
                78

                OT enables contactless payment with Swatch in Switzerland Colombes, France, June 16, 2016 OT (Oberthur Technologies), a leading global provider of embedded security software products and services,

                Add to Reading List

                Source URL: www.oberthur.com

                - Date: 2016-06-16 06:42:27
                  79

                  P2PWIFICAM Instruction Manual 1.In the Google APP search“p2pwificam” Run the software,and login in home page. 2.Add Camera ①Click the adding button in the home page

                  Add to Reading List

                  Source URL: www.lowcost-security.ch

                  - Date: 2015-02-11 08:52:00
                    80

                    Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs

                    Add to Reading List

                    Source URL: www.nominet.uk

                    - Date: 2015-10-06 11:03:26
                      UPDATE