software security

Results: 17991



#Item
321Computing / Software engineering / Software / Hypertext Transfer Protocol / JavaScript / Web development / World Wide Web / Ajax / HTTP cookie / Cross-site scripting / XMLHttpRequest / Cross-site request forgery

Laboratory for Computer Security Education 1 Cross-Site Scripting (XSS) Attack Lab cWenliang Du, Syracuse University.

Add to Reading List

Source URL: www.cis.syr.edu

Language: English - Date: 2010-11-01 16:33:26
322Ransomware / Malware / Cyberwarfare / Computer security / Cybercrime / Blackmail / Trojan horses / Computer virus / Antivirus software / PGPCoder / TeslaCrypt / CryptoLocker

2016 IEEE 36th International Conference on Distributed Computing Systems CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data Nolen Scaife

Add to Reading List

Source URL: www.cise.ufl.edu

Language: English
323Hacking / Software testing / Vulnerability / Flood / Physical geography / Prevention / Computer security

Sea Level Adaptation Working Group (SLAWG) Meeting Minutes Date: :30 – 10:00 am Attendees: Jim Walker (OOB), Bob Hamblen (Saco), Steve Zeeman (Biddeford), Jay Chace (Scarborough), Lucy LaCasse (Scarborough),

Add to Reading List

Source URL: www.smrpc.org

Language: English - Date: 2014-01-23 12:11:56
324Computing / Cloud computing / Software / Cryptography / Copy protection / FlexNet Publisher / System administration / Internet of things / Flexera Software / Installation / Computer security / Software as a service

Flexible licensing, activation, delivery and full lifecycle management Amy Konary – Research Vice President - Software Licensing &

Add to Reading List

Source URL: media.flexerasoftware.com

Language: English - Date: 2015-03-19 18:40:46
325Software / System software / Computer architecture / System administration / Secure Shell / Internet Standards / Unix / Cryptographic software / Filesystem Hierarchy Standard / Chroot / OpenSSH / Passwd

http://www.LinuxSecurity.com Security Glossary:

Add to Reading List

Source URL: en.tldp.org

Language: English - Date: 2000-09-18 13:37:46
326Computing / Cryptography / Network architecture / Internet protocols / Cryptographic protocols / Secure communication / Hypertext Transfer Protocol / World Wide Web / Transport Layer Security / Secure Remote Password protocol / Communications protocol / HTTPS

PLACES’10 The 3rd Workshop on Programming Language Approaches to Concurrency and Communication-Centric Software

Add to Reading List

Source URL: places10.di.fc.ul.pt

Language: English - Date: 2010-12-07 19:00:11
327Software / System software / Computer security / Antivirus software / Malwarebytes / Malware / Avira / Marcin Kleczynski / IObit

C A S E S T U DY Sun Products Corporation cleans up malware Leading provider of household products adds a layer of protection against malware and exploits with Malwarebytes Endpoint Security

Add to Reading List

Source URL: nl.malwarebytes.com

Language: English - Date: 2016-07-07 18:38:56
328Microsoft / Software / Computer access control / Password / Security / Outlook.com / Login / VS/9

Microsoft Word - Facility Online Manager User Manual.doc

Add to Reading List

Source URL: rfom.ad.uky.edu

Language: English - Date: 2009-02-28 19:59:14
329Computer security / ESET / Economy of Slovakia / Software / Usability / Malware / Antivirus software / ESET NOD32

DELIVERING BENEFITS TO SMALL OFFICE / HOME OFFICE LOWER COST

Add to Reading List

Source URL: cdn2-prodint.esetstatic.com

Language: English - Date: 2016-07-26 04:26:39
330Computing / Software / Cloud clients / Internet privacy / Norton / Symantec / Malware / Medical privacy / Smartphone / Mobile app / Personal /  Inc. / Norton Internet Security

Norton Mobile Apps Survey Report December 2014 An alarming percentage of apps collect and send personally identifiable information (PII) to app developers. Newly released

Add to Reading List

Source URL: now.symassets.com

Language: English - Date: 2016-04-18 05:29:35
UPDATE