software security

Results: 17991



#Item
471HTML / Password / Security / Form / Web development / Software / Computing

Quick Start Guide Create a New Account | Login | Search for a Course | Enroll and Checkout | Request Completion | View Transcript | Print Certificate of Completion | Customer Support Need help? Visit help.mivu.org or

Add to Reading List

Source URL: mi.learnport.org

Language: English - Date: 2015-05-01 11:19:13
472Computing / Information technology / Software / Data modeling / Data security / Splunk / System administration / Data analysis / Latent semantic analysis / Column / Visualization / Database

Building Blocks for Exploratory Data Analysis Tools Sara Alspaugh Archana Ganapathi UC Berkeley

Add to Reading List

Source URL: poloclub.gatech.edu

Language: English - Date: 2013-07-08 06:01:43
473Computer access control / Computer security / Computing / Identity management / Federated identity / Metadata standards / Shibboleth / Security Assertion Markup Language / SPNEGO / Identity provider / Kerberos / SAML-based products and services

Shibboleth Identity Provider (IdP) Version 3 Feature Update www.overtsoftware.com ©2016 Overt Software Solutions Ltd. All Rights Reserved

Add to Reading List

Source URL: www.overtsoftware.com

Language: English - Date: 2016-01-14 08:16:27
474Security / Computer security / Antivirus software / Cylance Inc.

CONSULTING YOU INVESTED IN ADVANCED THREAT PROTECTION. LET CYLANCE CONSULTING OPTIMIZE AND OPERATIONALIZE YOUR INVESTMENT. ThreatZERO™ Addresses Unique Challenges 

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2016-08-04 11:59:54
475Microsoft / Software / Webmail / Password / Security / Web portal / Form / Outlook.com

Portals Frequently Asked Questions 1. What applications are in each portal? In the Summary of Services you will find information about which portal to use for the products and services you need. Products and services are

Add to Reading List

Source URL: six.nsw.gov.au

Language: English - Date: 2016-06-29 03:05:37
476Computer security / Cryptography / Software / Cryptography standards / Resource Access Control Facility / FIPS 140-2 / FIPS 140 / Z/OS / Code signing / IBM System z

z/OS Version 2 Release 1 RACF Signature Verification Security Policy IBM® z/OS® Version 2 Release 1 Security Server RACF® Signature Verification Module version 1.0 FIPSNon-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-19 10:01:42
477Software / Computer security / System software / Antivirus software / Malwarebytes Anti-Malware / Malware / Avira / Zero-day / Computer virus / IObit / Bleeping Computer

C A S E S T U DY City of Westfield evicts malware Local government uses Malwarebytes to keep city employees running at peak performance Business profile

Add to Reading List

Source URL: ru.malwarebytes.com

Language: English - Date: 2016-07-07 18:42:41
478Computer security / Cyberwarfare / Computing / Computer network security / Software testing / Vulnerability / Hacking / Zero-day / Buffer overflow / Metasploit Project / Code injection / Social vulnerability

224 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 5,

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
479Computing / Computer security / Utility software / Identity management / Computer access control / SOA Security / WS-Security / Security Assertion Markup Language / WS-SecureConversation / WS-Policy / Security Patterns / XML Signature

trust claims buffer overrun tokens

Add to Reading List

Source URL: www.soaschool.com

Language: English - Date: 2013-01-08 15:17:40
480Software engineering / Computer programming / Computing / Subroutines / Computer security / Software bugs / Memory management / Return-oriented programming / Control-flow integrity / Control flow / Call stack / Gadget

2015 IEEE Trustcom/BigDataSE/ISPA Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses Bingchen Lan, Yan Li, Hao Sun, Chao Su, Yao Liu, Qingkai Zeng

Add to Reading List

Source URL: www.sec.in.tum.de

Language: English - Date: 2016-04-22 03:46:05
UPDATE