software security

Results: 17991



#Item
281Software / Computing / Password / Security / Social networking services / Pass / Facebook

INFORMATION FOR CREATING OR JOINING A TEAM! 1. Select the Team Captain: - The Team Captain must Register first - The Team Captain must create the Team before members can join 2. Choose a Team name that best fits your tea

Add to Reading List

Source URL: everyangelenocounts.org

Language: English - Date: 2016-07-11 13:20:16
282Security / Computer security / Computing / Software testing / Computer network security / Cryptography / National security / Information security / Penetration test / Professional certification / Vulnerability / Security testing

Microsoft Word - choose_the_right_pentesting_company.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:21:33
283Software engineering / Security / Computer programming / Access control / Computer access control / Kernel / JavaScript / Object-oriented programming / Data-flow analysis / Database / Program analysis

Leveraging “Choice” to Automate Authorization Hook Placement Divya Muthukumaran Trent Jaeger

Add to Reading List

Source URL: www.cse.psu.edu

Language: English - Date: 2012-12-21 22:14:54
284Software / Computing / Digital media / Social media / Social networking services / American brands / Universal Windows Platform apps / Secure communication / LinkedIn / Firebox / Facebook / Computer security

Social campaign drives 12,000+ engagements for new product WatchGuard Technologies is a global leader of integrated, multi–function business security solutions that

Add to Reading List

Source URL: www.voxuspr.com

Language: English - Date: 2016-01-12 17:16:00
285Computing / Software / Technology / Cloud clients / Information appliances / E-commerce / Mobile technology / Mobile security / Android / Mobile malware / Mobile app / Kaspersky Lab

App_Store_Badge_135x40_Master_062012

Add to Reading List

Source URL: www.entrustdatacard.com

Language: English - Date: 2016-02-11 14:34:25
286Computing / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Internet privacy / Cayuse / User / Point and click / Software / Computer security

UCI Cayuse 424 Quick Start Guide for Principal Investigator’s Professional Profile Getting Started Cayuse 424 is supported in recent versions of Firefox

Add to Reading List

Source URL: www.research.uci.edu

Language: English - Date: 2016-04-08 18:31:46
287Software / Microsoft / Computing / Password / Security / Login / Timesheet / Dashboard / Outlook.com

INSYS Unanet User Guide: Timesheets & Expenses

Add to Reading List

Source URL: www.insys.com

Language: English - Date: 2016-04-01 11:16:23
288Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Avira / Computer virus / Zero-day / Marcin Kleczynski

C A S E S T U DY Knutson Construction builds better malware defenses Minnesota construction company uses Malwarebytes Anti-Malware to clean up serious malware outbreak

Add to Reading List

Source URL: es.malwarebytes.com

Language: English - Date: 2016-07-07 18:34:11
289Software / Computing / Computer architecture / Computing platforms / Monolithic kernels / Kernel / Linux kernel / Address space layout randomization / Linux / Android / User space

Anatomy of a Remote Kernel Exploit Dan Rosenberg Copyright © 2011 Virtual Security Research, LLC.

Add to Reading List

Source URL: vulnfactory.org

Language: English - Date: 2012-01-16 13:38:49
290Computing / Computer access control / Software / Access control / Password / Security / User / Veterans of Foreign Wars / Login / Prepared statement / Form

DEPARTMENT REPORTING GUIDELINES

Add to Reading List

Source URL: www.vfwca.org

Language: English - Date: 2015-06-24 11:41:19
UPDATE