software security

Results: 17991



#Item
221Microsoft / Software / Password / Security / Push Notification / TAP Portugal / Outlook.com / Tap dance

How to use Event App How to… Create a Profile ……….……….....…….……………. 1

Add to Reading List

Source URL: s3-us-west-1.amazonaws.com

Language: English - Date: 2016-06-21 11:01:18
222Software / Computing / Economy / E-commerce / Webmail / Cross-platform software / Computer network security / Mobile banking / Mobile content / Outlook.com / Password / Gmail

QXP_Layout:22 AM Page 1 ONLINE SERVICE AGREEMENT

Add to Reading List

Source URL: www.adambank.com

Language: English
223Technology / Computing / Security / Dell / WebCT / Email / Computer security / Internet / Application software / Computer virus

Information Technologies Factsheet 2011

Add to Reading List

Source URL: cio.unm.edu

Language: English - Date: 2013-09-25 13:28:59
224Computer security / Computer access control / Software / Computing / Access control / Memory management / Memory protection / Kernel / Capability-based security / Operating system / Access Control Matrix / File system

Protection1 Butler W. Lampson Xerox Corporation Palo Alto, California Abstract

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 1997-12-31 17:54:34
225Computing / Software / Computer architecture / Smartphones / Cloud clients / E-commerce / Mobile operating systems / Information appliances / Mobile security / Android / Mobile banking / Mobile app

When Mobile is Harder Than Fixed (and Vice Versa): Demystifying Security Challenges in Mobile Environments Jon Oberheide Farnam Jahanian

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-11 18:23:00
226Computing / Software testing / Software engineering / Software quality / Common Weakness Enumeration / Vulnerability / Coverity / Analysis / Fortify Software / Application security / LDRA Testbed / Static program analysis

Advanced Science and Technology Letters Vol.93 (Security, Reliability and Safety 2015), pp.5-8 http://dx.doi.orgastlA Software Weakness Analysis Technique for Secure Software

Add to Reading List

Source URL: onlinepresent.org

Language: English - Date: 2015-04-19 22:44:46
227Backup / Data security / Cloud storage / Computing / Backup software / Online backup services / Computer data storage

CLIENT SUCCESS STORY WHEN CRITERIA FOR SUCCESS FOUND THEIR SERVER SITTING IN A POOL OF WATER THEY KNEW THEY NEEDED A BETTER WAY TO SECURE THEIR DATA Sales improvement consultancy turns to KeepItSafe to improve their own

Add to Reading List

Source URL: www.keepitsafej2.co.uk

Language: English - Date: 2016-08-18 06:15:35
228Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Avira / Computer virus / Zero-day / Marcin Kleczynski

C A S E S T U DY Knutson Construction builds better malware defenses Minnesota construction company uses Malwarebytes Anti-Malware to clean up serious malware outbreak

Add to Reading List

Source URL: pt.malwarebytes.com

Language: English - Date: 2016-07-07 18:41:23
229Backup software / System software / Computing / Software / Backup / Data security / Remote backup service / Server

CLIENT SUCCESS STORY PROTRAVEL INTERNATIONAL KNOWS FROM EXPERIENCE THAT THEIR DATA IS SAFE AND EASILY RETRIEVABLE WITH KeepItSafe THE CHALLENGE “When you’re panicked

Add to Reading List

Source URL: www.keepitsafej2.co.uk

Language: English - Date: 2016-08-18 06:15:35
230Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Avira / Zero-day / Marcin Kleczynski / IObit

C A S E S T U DY cleverbridge outsmarts malware With Malwarebytes Anti-Malware for Business, the cleverbridge security team proactively prevents malware from getting into the enterprise Business profile

Add to Reading List

Source URL: nl.malwarebytes.com

Language: English - Date: 2016-07-07 18:38:56
UPDATE