software security

Results: 17991



#Item
291Computer security / Cyberwarfare / Software / Antivirus software / Malwarebytes / Malware / Ransomware / Computer virus / Rootkit / Zero-day / Marcin Kleczynski / IObit

C A S E S T U DY Electrical contracting firm short-circuits malware threats Briggs Electric uses Malwarebytes to remediate CryptoLocker and prevent malware from shocking its systems

Add to Reading List

Source URL: nl.malwarebytes.com

Language: English - Date: 2016-07-07 18:38:56
292Software / Reputation management / McAfee / Freeware / McAfee SiteAdvisor / Antivirus software / Intel Security / Adviser / Norton Safe Web

FAQ SiteAdvisor FAQ (Revision Date: Table of Contents SiteAdvisor FAQ ...........................................................................................................................................

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2013-04-03 12:17:07
293Computing / Security / Cyberwarfare / Computer security / Crime prevention / Cryptography / Information governance / National security / Application security / Cross-site request forgery / Software development kit / Vulnerability

#1 GLOBAL PAYMENTS COMPANY OPTIMIZES SECURE DEVELOPMENT PROCESS WITH PREVOTY Trusted payments provider with deeply embedded secure development culture partners with Prevoty for standardized, real-time application protect

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2016-08-18 22:09:36
294Software / Technology / Mobile technology / Smartphones / Alarms / Security alarm / IPhone / Short Message Service / Alert messaging / Messages

A658_iBridge-Messenger-spec-sheet copy

Add to Reading List

Source URL: www.napcosecurity.com

Language: English - Date: 2014-04-16 16:53:42
295Software / Computing / System software / Internet Standards / Cryptographic protocols / Cross-platform software / Simple Authentication and Security Layer / Email authentication / Red Hat / CRAM-MD5 / Generic Security Services Application Program Interface / Cygwin

GNU SASL Simple Authentication and Security Layer for the GNU system for version 1.7.0, 22 October 2010 Simon Josefsson

Add to Reading List

Source URL: josefsson.org

Language: English - Date: 2015-08-11 16:46:22
296Unix / Computing / Software / System software / Digital media / Research / System administration / USENIX / Cyber-physical system / Electronic submission / Computer security

Announcement and Call for Papers 4th Workshop on Cyber Security Experimentation and Test (CSET ’11) Sponsored by USENIX, the Advanced Computing Systems Association http://www.usenix.org/cset11

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-04-25 15:59:03
297Computing / Software development process / Cloud infrastructure / Agile software development / DevOps / Information technology management / Webroot / To The New / Cloud computing / Software testing / DevOps toolchain

Case Study | Security/Technology | Cloud Automation & Management SELF-SERVICE INFRASTRUCTURE DEVOPS Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individua

Add to Reading List

Source URL: www.kovarus.com

Language: English - Date: 2016-07-11 19:38:57
298Computing / Software / Security / Data management / Cyberwarfare / Secure communication / Computer network security / Computer security / Cryptography / Big data / Git / Data security

Microsoft PowerPoint - Security _ A Big Question for Big Data.ppt [Compatibility Mode]

Add to Reading List

Source URL: www.ischool.drexel.edu

Language: English - Date: 2014-02-06 12:27:42
299Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Trusteer / Avira / Computer virus / Zero-day / Marcin Kleczynski / IObit

C A S E S T U DY Allied Food gives malware a to-go package Restaurant operator supports PCI compliance with Malwarebytes Business profile

Add to Reading List

Source URL: br.malwarebytes.com

Language: English - Date: 2016-07-07 18:30:53
300Domain name system / Internet / Computing / Network architecture / DNS spoofing / Domain Name System Security Extensions / Name server / DNS zone / Pharming / Comparison of DNS server software / Google Public DNS

DNS Threat Analysis Mark Santcroos∗, Olaf M. Kolkman†NLnet Labs www.nlnetlabs.nl NLnet Labs document 2006-SE-01 version 1.0 ∗

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:10
UPDATE