software security

Results: 17991



#Item
381Computing / Cloud computing / Cloud infrastructure / Platform as a service / Cloud-based integration / Software as a service / Cloud computing issues / Cloud computing security

CoCo_Cloud Presentation DPSP cluster Napoli

Add to Reading List

Source URL: eucloudclusters.files.wordpress.com

Language: English - Date: 2016-03-07 06:09:15
382Computer security / Computing / Cyberwarfare / Software bugs / Computer errors / Shellcode / Buffer overflow / Return-oriented programming / Heap overflow / Address space layout randomization / Symbolic execution / Exploit

doi:The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
383Cryptography / Advanced Encryption Standard / X86 instructions / Rambus / Side-channel attack / AES instruction set / Cryptography Research / Masking / Technology / Computing

Microarchitectures Undo Software Security Measures • To implement secure algorithms, software based cryptography utilizes the ISA through instructions or cryptographic extensions.

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2015-08-21 02:18:30
384Software / Computer security / System software / Antivirus software / Malwarebytes Anti-Malware / Malwarebytes / Malware / Avira / Computer virus / IObit

C A S E S T U DY Cambria Countyprevents malware emergencies Malwarebytes Endpoint Security sounds the alarm, stopping exploits before they cause problems

Add to Reading List

Source URL: es.malwarebytes.com

Language: English - Date: 2016-07-07 18:34:11
385Software / Computer security / System software / Antivirus software / Malwarebytes Anti-Malware / Malware / Computer virus / Avira / Ransomware / IObit

C A S E S T U DY City of Memphis gives malware the blues Malwarebytes puts distance between advanced threats and city endpoints Business profile

Add to Reading List

Source URL: pl.malwarebytes.com

Language: English - Date: 2016-07-07 18:40:15
386Software / Malware / Computer security / Antivirus software / Rogue software / Malwarebytes Anti-Malware / Scareware / Ransomware / Computer virus / Rogue security software / IObit

C A S E S T U DY At United Bank, there is no payoff for ransomware Bank uses Malwarebytes to prevent malware and exploits from cashing in Business profile

Add to Reading List

Source URL: it.malwarebytes.com

Language: English - Date: 2016-07-06 12:38:04
387Software / Computer security / System software / Antivirus software / Malwarebytes Anti-Malware / Malware / Avira / Computer virus / Rootkit / IObit / Bitdefender

Crushes malware. Restores confidence. Malwarebytes products have a proven record of protecting computers by completely removing all forms of malware including viruses, trojans, spyware, adware, and rootkits. Intelligent

Add to Reading List

Source URL: fr.malwarebytes.com

Language: English - Date: 2016-05-10 22:50:02
388Internet / Computing / Cryptography / Internet Standards / Internet protocols / Domain name system / DNSSEC / Public-key cryptography / Domain Name System Security Extensions / DNS spoofing / NSD / Comparison of DNS server software

DNSSEC Raising the Barriers against DNS exploits Olaf M. Kolkman ()

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:03
389Computing / Software / Internet privacy / World Wide Web / Social networking services / Privacy / Opt-out / Zabasearch.com / Identity theft / Medical privacy / Facebook / Online advertising

Opt-Out of Online (vA Hetherington Group Publication FOUND ONLINE As a professional security and investigative group, we assist those in the high profile market with a good deal of day-to-day exposure in protectin

Add to Reading List

Source URL: www.hetheringtongroup.com

Language: English - Date: 2014-10-29 18:40:37
390Computing / Security / Computer security / Content-control software / Computer network security / Fortinet / Emerging technologies / Cloud computing / Internet of things / Accelops

Fortinet Security Fabric White Paper

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2016-08-02 16:38:44
UPDATE