software security

Results: 17991



#Item
491Software / Computer security / System software / Antivirus software / Malwarebytes Anti-Malware / Malware / Kaspersky Anti-Virus / Microsoft Forefront / Kasperski / Kaspersky Lab / IObit

C A S E S T U DY Frontier School Division banishes malware Remote school district uses Malwarebytes Anti-Malware for Business to eliminate malware without flying staff to each location Business profile

Add to Reading List

Source URL: de.malwarebytes.com

Language: English - Date: 2016-07-07 18:32:31
492Computer security / Software / Security / Computer network security / Crime prevention / National security / Antivirus software / Intrusion detection system / Avira / Center for Internet Security / Attack / Security alarm

ALDR: A New Metric for Measuring Effective Layering of Defenses ∗ Nathaniel Boggs Department of Computer Science Columbia University

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
493Computing / Network architecture / Network protocols / Computer network security / Application server / Software architecture / Load balancing / Hypertext Transfer Protocol / Middlebox / Transmission Control Protocol / Web server

xOMB: Extensible Open Middleboxes with Commodity Servers James W. Anderson, Ryan Braud, Rishi Kapoor, George Porter, and Amin Vahdat University of California, San Diego {jwanderson,rbraud,rkapoor,gmporter,vahdat}@cs.ucs

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2013-02-20 11:32:27
494Computing / Computer security / Cyberwarfare / Computer network security / Hacking / Cross-site scripting / Vulnerability / OWASP / Software quality / Application security / Software / Security

Microsoft PowerPoint - DenimGroup_IntroductionToApplicationSecurity.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:17:57
495Software / Computer security / System software / Antivirus software / Malwarebytes Anti-Malware / Malware / Avira / Hypertherm / Computer virus / Zero-day / Draft:Marcin Kleczynski / Bleeping Computer

C A S E S T U DY Hypertherm cuts malware out of the picture Manufacturing firm improves application performance for its endpoints globally by eliminating malware

Add to Reading List

Source URL: it.malwarebytes.com

Language: English - Date: 2016-07-07 18:37:33
496Technology / Computing / Security / Computer network security / Internet privacy / Cultural globalization / Internet / New media / Telegraphy / Content-control software / Educational technology / Computer security

INSTRUCTIONTechnology Usage Policy The Inter-Lakes School District (hereto referred as “District”) recognizes the value of computer and other

Add to Reading List

Source URL: www.inter-lakes.k12.nh.us

Language: English - Date: 2016-05-31 20:05:16
497Software / System software / Computer security / Antivirus software / Zemana / Avira / Computer virus / Mobile malware / Android / Avast Software / OPSWAT

Technology Partnership Mobile Antivirus SDK About us A privately held security company founded in 2007 The best security team for “Online Fraud / ID Theft ” in the world

Add to Reading List

Source URL: dl9.zemana.com

Language: English - Date: 2016-06-10 10:05:32
498Software / Computer security / System software / Antivirus software / Malware / Computer virus / Zero-day / Avira / Draft:Marcin Kleczynski / Bleeping Computer

C A S E S T U DY Florida Gulf Coast University teaches malware a lesson Malwarebytes Anti-Malware for Business enables the Library Computing and Technology department to eliminate malware from staff systems

Add to Reading List

Source URL: es.malwarebytes.com

Language: English - Date: 2016-07-07 18:34:11
499Software / Elementary arithmetic / Nothing / Tar / Record / Computing / Lost /  mislaid /  and abandoned property / Security / Trademark / System software

NAUPA Standard Electronic File Format

Add to Reading List

Source URL: www.kansascash.com

Language: English - Date: 2015-11-10 11:44:19
500Technology / Mobile technology / Wireless / Mobile device management / Mobile phones / Mobile app / Bring your own device / Enterprise mobility management / Business process management / Mobile security / Application software / Mobile business intelligence

CITO Research CITO Research 2015 Executive

Add to Reading List

Source URL: techorchard.com

Language: English - Date: 2015-08-13 13:38:08
UPDATE