software security

Results: 17991



#Item
301Computing / Security / Computer security / Computer network security / Application security / Data center / Arxan Technologies / Software Development Security

Arxan Best Practices White Paper 7 Key Factors of a Highly Effective Application Protection Solution Abstract: This whitepaper discusses the key factors that enable an effective application protection solution -that mit

Add to Reading List

Source URL: www.arxan.com

Language: English - Date: 2016-08-01 23:51:09
302Engineering / Safety / Prevention / Actuarial science / Risk / Security / Financial risk / Software quality / Landslide / Hazard / Social vulnerability / Natural hazard

J. Mt. Sci): DOI: s11629e-mail: http://jms.imde.ac.cn

Add to Reading List

Source URL: homepage.univie.ac.at

Language: English - Date: 2015-06-01 23:37:01
303Ransomware / Malware / Computer security / Cyberwarfare / Locky / Phishing / Trend Micro / Antivirus software / Linux.Encoder.1

SOLUTION BRIEF Trend Micro RANSOMWARE PROTECTION FOR YOUR SMALL BUSINESS

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2016-05-18 13:59:03
304Malware / Cyberwarfare / Computer security / Ransomware / Cybercrime / Social engineering / Cryptography / Antivirus software / Computer virus / Phishing / Scareware / Locky

INFOGRAPHIC - MalwareBytes - Ransomware Infographic UPDATE

Add to Reading List

Source URL: pl.malwarebytes.com

Language: English - Date: 2016-07-07 13:05:33
305Cryptography / Public key infrastructure / Email authentication / Public-key cryptography / Cryptographic software / Email encryption / Encryption / Email client / Email / Cipher / Draft:GoldBug / Email privacy

Email security for counsellors With the increasing use of online counselling within student counselling services, preserving confidentiality is a major concern. Stephen Allsopp explains how sending an email is the equiva

Add to Reading List

Source URL: bacpuc.org.uk

Language: English - Date: 2016-02-25 06:22:14
306Computing / Software / Network management / Information technology management / Internet Standards / Internet protocols / System administration / Computer systems / Syslog-ng / Syslog / Balabit / Logfile

syslog-ng Store Box PRODUCT DESCRIPTION CopyrightBalaBit IT Security All rights reserved.

Add to Reading List

Source URL: amministratore-di-sistema.it

Language: English - Date: 2014-05-07 13:40:47
307Computing / Prevention / Evaluation / Computer security / Security / Information technology management / Data security / IT risk management / Software assurance / Vulnerability / Application security / ISO/IEC 27000-series

Principles for Software Assurance Assessment A Framework for Examining the Secure Development Processes of Commercial Technology Providers PRIMARY AUTHORS: Shaun Gilmore, Senior Security Program Manager,

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2015-11-20 16:43:16
308Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Avira / Rootkit / Marcin Kleczynski / IObit

C A S E S T U DY Sioux County roots out malware Malwarebytes helps county government secure endpoints and meet compliance requirements while increasing IT productivity Business profile

Add to Reading List

Source URL: fr.malwarebytes.com

Language: English - Date: 2016-07-07 18:35:52
309Computer security / System software / Software / Trusted computing base / Mandatory access control / Security-Enhanced Linux / Kernel / Policy Monitoring / System call / XTS-400

The Case for Abstracting Security Policies   

Add to Reading List

Source URL: rich.recoil.org

Language: English - Date: 2006-04-13 14:58:02
UPDATE