software security

Results: 17991



#Item
481Computing / Software / Security / Identity management / Law / Privacy / Internet privacy / Ubiquitous computing / Usability / Information privacy / Ambient intelligence / Medical privacy

A Usability Evaluation of a Home Monitoring System Rajah James Aleecia M. McDonald Robert McGuire

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-22 15:47:38
482Software / Computing / Computer architecture / Compilers / Instruction set architectures / Programming language implementation / Machine code / GNU Compiler Collection / X86 / Assembly language / LLVM / NOP

SACK: a Semantic Automated Compiler Kit Colby T. Skeggs Applications o Rapid architecture testing o Automatically-generated architectures: o For security

Add to Reading List

Source URL: www.celskeggs.com

Language: English
483Security / Prevention / Computing / Crime prevention / Cryptography / Information governance / National security / Software project management / Computer security / Abuse case / Vulnerability / Andreas Lothe Opdahl

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: , Volume 3, Issue 2, March – April 2014 ISSNMea

Add to Reading List

Source URL: www.ijettcs.org

Language: English - Date: 2014-05-13 04:33:09
484Software / Computer security / Cyberwarfare / Antivirus software / Malwarebytes Anti-Malware / Malware / Ransomware / Computer virus / Rootkit / Zero-day / Avira / IObit

C A S E S T U DY Electrical contracting firm short-circuits malware threats Briggs Electric uses Malwarebytes to remediate CryptoLocker and prevent malware from shocking its systems

Add to Reading List

Source URL: fr.malwarebytes.com

Language: English - Date: 2016-07-07 18:35:52
485Software / Computer security / System software / Antivirus software / Malwarebytes Anti-Malware / Malware / Intel Security / Ransomware / Avira / IObit

C A S E S T U DY University of Central Lancashire masters malware The University protects its mobile workforce with Malwarebytes Business profile

Add to Reading List

Source URL: ru.malwarebytes.com

Language: English - Date: 2016-07-07 18:42:41
486Computing / Software / BIOS / Computer architecture / Cyberwarfare / Rootkit / Firmware / Broadcom / Booting

How to develop a rootkit for Broadcom NetExtreme network cards Guillaume Delugr´e Sogeti / ESEC R&D guillaume(at)security-labs.org

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
487Computer access control / Software / Computer security / Access control / FIPS 201 / PIV / Login / Single sign-on / Password / SharePoint

PIV Login Quick Reference Guide   PIV Users can only login with Internet Explorer What is PIV and who uses it?

Add to Reading List

Source URL: floodmaps.fema.gov

Language: English - Date: 2016-03-23 12:12:55
488Computer access control / Prevention / Software / Password / Security / Web portal / Access control / Login / Form

LOPR Portal Notification User Guide Regulatory Division Bourse de Montréal Inc. Document Revision: 1.0

Add to Reading List

Source URL: reg.m-x.ca

Language: English - Date: 2016-05-03 12:26:34
489Government / XMetaL / SoftQuad Software / Homeland Security Act / Computing / International Multilateral Partnership Against Cyber Threats / United States Department of Homeland Security / M14 rifle / Software

C:rsCKS~1DatamingtQuadtaL8ATCLI~1.XML

Add to Reading List

Source URL: docs.house.gov

Language: English
490Microsoft / Software / Webmail / Password / Security / Form / Academic term / Outlook.com

SUMMER 2016 REGISTRATION INFORMATION Summer registration begins on Tuesday, March 8th and your access to online registration will be granted once you have completed the set-up and password creation for your JHED ID. Summ

Add to Reading List

Source URL: web.jhu.edu

Language: English
UPDATE