software security

Results: 17991



#Item
391Software / Computer security / System software / Antivirus software / Malwarebytes Anti-Malware / Bitdefender / Malwarebytes / Malware / Zero-day / Avira / Computer virus / IObit

C A S E S T U DY Standard School District gives malware a failing grade District adopts Malwarebytes to block malware and improve endpoint performance Business profile

Add to Reading List

Source URL: de.malwarebytes.com

Language: English - Date: 2016-07-07 18:32:31
392Software / Computing / System software / Computer network security / Iptables / Packet processing / Firewall / Netfilter / Communications protocol / Transmission Control Protocol / Ipfirewall / Statistical classification

Trees in the List: Accelerating List-based Packet Classification Through Controlled Rule Set Expansion Sven Hager Stefan Selent

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:55:48
393Computing / Software / System software / Hardware virtualization / X86 virtualization / Virtual machine / Hypervisor / Hardware-assisted virtualization / Virtualization / Multilevel security / VM / Protection ring

Layered Assurance Scheme for Multi-Core Architectures J. Alves-Foss, X. He and J. Song Center for Secure and Dependable Systems University of Idaho ,[xhhe,song3202]@vandals.uidaho.edu

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:30
394Cryptography / Computer access control / Obfuscation / Password / Security / Crypt / Cryptographic software / Password policy / Password strength

Directions To Open Encrypted E-Mails From The State Of Utah When you open an encrypted e-mail from the State of Utah you will see the following message: Depending on which e-mail program you use, you may also see the f

Add to Reading List

Source URL: laborcommission.utah.gov

Language: English - Date: 2015-09-15 11:55:14
395Internet privacy / World Wide Web / Computing / Software / Hypertext Transfer Protocol / Internet advertising / Computer access control / HTTP cookie / Internet marketing / Web analytics / Ghostery / DoubleClick

The Case for a General and Interaction-based Third-party Cookie Policy Istemi Ekin Akkus1, Nicholas Weaver2 1 Max

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-11 00:33:43
396One Laptop per Child / Software / Computing / System software / Bitfrost / Laptop / Sugar / Security token / Personal firewall / OLPC XS / Hardware restriction

Bitfrost: the One Laptop per Child Security Model Ivan Krsti´c Simson L. Garfinkel One Laptop per Child

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-08 09:53:29
397Software / Computing / Computer network security / Cloud clients / Portable software / Web browsers / Hypertext Transfer Protocol / Browser security / HTTP cookie / JavaScript / Google Chrome / Browser extension

Run-time Monitoring and Formal Analysis of Information Flows in Chromium Lujo Bauer Shaoying Cai? Limin Jia Timothy Passaro Michael Stroucken Carnegie Mellon University ? Institute for Infocomm Research

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
398Cryptography / Watermarking / Digital watermarking / Banknotes / Money forgery / Stationery / Watermark / Access control / Audio watermark / Digital rights management / Cinavia

Side-Channel Watermarks for Embedded Software Georg T. Becker ∗ , Wayne Burleson∗ , Christof Paar∗† , ∗ University of Massachusetts Amherst, USA † Horst G¨ ortz Institute for IT Security Ruhr University Boch

Add to Reading List

Source URL: vcsg.ecs.umass.edu

Language: English - Date: 2011-05-10 15:38:52
399Computing / Cloud computing / Software engineering / Cloud infrastructure / Cloud Security Alliance / St. Cloud /  Minnesota / Risk / Applied Physics Laboratory / Community cloud / APL / Cloud Strife / Cloud computing issues

Tech Digest Figure Template_2 column_01-06-12

Add to Reading List

Source URL: techdigest.jhuapl.edu

Language: English - Date: 2015-09-24 12:49:12
400Server / Server hardware / Computing / INI file / Security software / Ambient intelligence

Spring 2015 Computing at INI Mira Angelova Director of Business Operations January 16, 2015

Add to Reading List

Source URL: www.ini.cmu.edu

Language: English - Date: 2015-01-22 17:09:32
UPDATE