software security

Results: 17991



#Item
361Cryptography / Message authentication codes / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Digital Signature Algorithm / FIPS 140-2 / Dual EC DRBG / OpenSSL / SHA-2 / Hash-based message authentication code

FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-05-26 13:27:36
362Malware / Computer security / Cyberwarfare / Antivirus software / Malwarebytes Anti-Malware / Computer virus / Ransomware / Zero-day / Rootkit

C A S E S T U DY Agnico Eagle Mines Ltd. strikes gold with Malwarebytes Malwarebytes proactively blocks exploits from entering and digging in Business profile

Add to Reading List

Source URL: br.malwarebytes.com

Language: English - Date: 2016-07-21 17:36:12
363Software / Computer security / System software / Antivirus software / Malwarebytes Anti-Malware / Malware / Avira / Zero-day / Computer virus / IObit / Bleeping Computer

C A S E S T U DY City of Westfield evicts malware Local government uses Malwarebytes to keep city employees running at peak performance Business profile

Add to Reading List

Source URL: it.malwarebytes.com

Language: English - Date: 2016-07-07 18:37:33
364Software / Computer security / System software / Antivirus software / Proprietary software / Norton Internet Security / Benchmark / PCMark / Computer virus / Avira / Malware / Norton

Document: Authors: Company: Date: Edition: File:

Add to Reading List

Source URL: www.passmark.com

Language: English - Date: 2015-11-30 00:17:08
365Microsoft / Software / Computing / Webmail / Password / Security / Outlook.com / Registered user / Address / Email address / ZIP Code / Email

STATE OF MISSOURI DEPARTMENT OF PUBLIC SAFETY OFFICE OF THE DIRECTOR WEBGRANTS GRANTS MANAGEMENT SYSTEM

Add to Reading List

Source URL: dps.mo.gov

Language: English - Date: 2016-07-11 10:20:01
366Software / Computing / Remote desktop / Computer network security / Tunneling protocols / Virtual private networks / OpenConnect / Citrix Systems / Windows 10 / Personal computer / Google Chrome

work IQ badges_PMS_COLORS

Add to Reading List

Source URL: www.oc.com

Language: English - Date: 2016-06-02 15:50:09
367Security / Computer security / Compact Disc and DVD copy protection / Arxan Technologies / Copyright law / Prevention / Warez / Cryptography

Securing DRM and Multimedia Applications through Guard Technology Arxan Technologies White Paper – Arxan protects your IP from software piracy, tampering, reverse engineering and any manner of theft.

Add to Reading List

Source URL: www.arxan.com

Language: English - Date: 2016-08-01 23:57:15
368Software / Bloomberg Aptitude Test / Bloomberg L.P. / Microsoft PowerPoint / Security

Finance 124: Investments Winter Quarter 2016 H. Shefrin Syllabus

Add to Reading List

Source URL: www.bbhub.io

Language: English - Date: 2016-05-31 14:24:48
369Cryptography / Public-key cryptography / Cryptographic software / Secure communication / Cryptographic protocols / Internet protocols / Transport Layer Security / NSA Suite B Cryptography / Cipher suite / OpenSSL / IPsec / SHA-1

Microsoft PowerPoint - preneel_isse15_v1.pptx

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2015-11-15 11:53:49
370Computer security / Software / Cyberwarfare / Mobile Malware / Smartphones / Mobile security / Malware / Android / Computer virus / Google Play / DroidKungFu / Antivirus software

Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets Yajin Zhou Zhi Wang Wu Zhou Xuxian Jiang Department of Computer Science North Carolina State University {yajin zhou,zhi

Add to Reading List

Source URL: yajin.org

Language: English
UPDATE