software security

Results: 17991



#Item
431Software engineering / Theoretical computer science / Logic / Logic programming / Models of computation / Functional languages / Computability theory / Lambda calculus / Substitution / Standard ML / Higher-order abstract syntax / Security type system

c 2005 Cambridge University Press JFP 15 (6), Meta-Programming through Typeful

Add to Reading List

Source URL: www.cs.bu.edu

Language: English - Date: 2005-06-23 21:20:00
432Security / Computer security / Prevention / Data security / Crime prevention / Cryptography / National security / Vulnerability / Information security / Attack / Trusted computing base / Software security assurance

Security Watch Rebecca T. Mercuri Computer Security: Quality Rather than Quantity

Add to Reading List

Source URL: www.notablesoftware.com

Language: English - Date: 2007-02-28 16:29:24
433Software / Computing / Web browsers / Internet privacy / Cross-platform software / News aggregators / Computer network security / HTTP cookie / Device fingerprint / JavaScript / Firefox / Google Chrome

Cookieless Monster: Exploring the Ecosystem of Web-based Device Fingerprinting Nick Nikiforakis∗ , Alexandros Kapravelos† , Wouter Joosen∗ , Christopher Kruegel† , Frank Piessens∗ , Giovanni Vigna† ∗ iMinds

Add to Reading List

Source URL: securitee.org

Language: English - Date: 2013-03-11 10:59:39
434Computing / Internet / Internet Standards / Computer network security / MOVEit / DMZ / File Transfer Protocol / Ipswitch /  Inc. / FTPS / Password / Comparison of FTP client software / Email

MOVEit® DMZ Manual v7.5 Contents Contents

Add to Reading List

Source URL: ftps.maine.gov

Language: English - Date: 2013-02-03 12:55:26
435Software engineering / Computing / Computer programming / Applied Physics Laboratory / Johns Hopkins University / Laurel /  Maryland / APL programming language family / APL

APL Achievement Awards and Prizes Linda L. Maier-Tyler hallenges to our national security are increasing. Terrorism, climate and demographic changes, resource protection and cybersecurity, and the impact of extreme econo

Add to Reading List

Source URL: techdigest.jhuapl.edu

Language: English - Date: 2016-04-15 14:57:49
436Software / Locksmithing / Security engineering / System software / Combination lock / File locking / Widget / Key / User interface / Time-delay combination locks

American Security Product Co. American Security Product Co. is then required to key a valid code. If no second code is keyed within 10 seconds, the lock goes to the resting condition and the process must be started agai

Add to Reading List

Source URL: www.maximumsecurity.com

Language: English - Date: 2011-03-02 17:04:44
437Computing / Computer network security / Computer security / Computer networking / Internet privacy / Network performance / Proxy server / Firewall / Stateful firewall / SOCKS

Greenshades Software hosts a variety of web pages that are intended for client use, such as GreenEmployee.com, GreenshadesOnline.com, and DownloadMyForm.com. Additionally, many of our software applications run on client-

Add to Reading List

Source URL: www.greenshades.com

Language: English - Date: 2015-10-14 12:18:54
438Cryptography / Free software / Software / Cloud storage / Cryptographic software / OwnCloud / Disk encryption / Key management / Encryption / Internet security / Public-key cryptography / Nextcloud

ownCloud Security and Encryption 2.0 A Technical Overview As the use of file sharing increases across the industry, more attention is being paid to the inherent security of these solutions and the need for corporations t

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2016-04-12 11:34:59
439Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Data security / Information security / Internet privacy / Computer security / Usability

Two Experiences Designing for Effective Security Rogério de Paula, Xianghua Ding, Paul Dourish, Kari Nies, Ben Pillet, David Redmiles, Jie Ren, Jennifer Rode and Roberto Silva Filho Institute for Software Research Unive

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-05-30 20:35:30
440Computer network security / Computing / Virtual private networks / Computer architecture / Software / Network architecture / Internet privacy / Crypto-anarchism / Internet Connect / Point and click / SoftEther VPN / OpenVPN

Configure a VPN connection in Mac OS X The following guide is based on an English OS X Leopardbut with minor modifications the approach should work for other versions of OS X as well (For some versions it might b

Add to Reading List

Source URL: www.soc.ku.dk

Language: English - Date: 2016-08-22 10:32:30
UPDATE