software security

Results: 17991



#Item
501Security / Cyberwarfare / Computer security / Cryptography / Computer network security / Cybercrime / Malware / Internet privacy / Antivirus software / CrySyS Lab

Int. Secure Systems Lab Vienna University of Technology Identifying Dormant Functionality in Malware Programs Paolo Milani Comparetti

Add to Reading List

Source URL: oakland31.cs.virginia.edu

Language: English - Date: 2010-05-26 16:17:45
502Computer security / Security / Computer access control / Cyberwarfare / Identity theft / Cybercrime / Computer network security / Rogue software / Spyware / Password / Multi-factor authentication / Phishing

Tips on Online Security Security Practices to Safeguard Your Password You are advised to adopt the following: • • •

Add to Reading List

Source URL: secure.ifastnetwork.com

Language: English - Date: 2014-09-25 22:08:54
503Software / Computing / Facebook / Social networking services / Universal Windows Platform apps / Anomaly detection / Data mining / Data security / Malware / Google Chrome / Criticism of Facebook

Towards Detecting Anomalous User Behavior in Online Social Networks Bimal Viswanath MPI-SWS Krishna P. Gummadi MPI-SWS

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2014-07-14 10:42:22
504Software / Computing / User interface techniques / Security / Software architecture / User interfaces / Humancomputer interaction / Technical communication / Usability / Desktop metaphor / Computer security / Interface metaphor

Microsoft Word - Soups_Poster_Abstract_R4-JCS.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-06-05 14:06:17
505Smartphones / Mobile operating systems / Software / Computing / Tablet computers / IOS / Classes of computers / Foxconn / IPad / IOS version history

Manual for GooLink (iPad) Contents 1. Introduction .................................................................................................................................. 3 1.1 Function introduction .........

Add to Reading List

Source URL: www.lowcost-security.ch

Language: English - Date: 2015-04-20 07:28:09
506Computing / Computer network security / Computer security / Software / Computer access control / Directory services / RADIUS / NetIQ eDirectory / TACACS / Integrated Windows Authentication / Comparison of mail servers

RadiusNT & RadiusX The Ultimate RADIUS Servers For Windows NT, Linux, Solaris & Cobalt Appliances Version 4.0

Add to Reading List

Source URL: www.iea-software.com

Language: English - Date: 2006-11-25 04:29:55
507Computing / Software / Cyberwarfare / Antivirus software / Spamming / Cybercrime / E-commerce / Computer viruses / Email spam / Malware / Macro virus / Anti-spam techniques

On-line security Decalogue mBank.pl Security measures adopted in CompanyNet system

Add to Reading List

Source URL: www.mbank.pl

Language: English - Date: 2016-03-24 02:40:02
508Computer security / Security / Computing / Veracode / Software testing / Web application firewall / Application security / Vulnerability / Application firewall

Veracode Runtime Protection

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2016-06-03 14:45:23
509Hacking / Software testing / Vulnerability / Computer security / Cyberwarfare / Risk

Security Sub-Committee (SSC) Charter Version 1.0.1, April 21, 2015 Purpose Security mistakes in any AllSeen project could be publicly perceived as reflecting poorly on the AllSeen project as a whole. That could damage b

Add to Reading List

Source URL: wiki.allseenalliance.org

Language: English - Date: 2016-04-11 14:38:57
510Software / Computer security / System software / Antivirus software / Malwarebytes Anti-Malware / Malware / Computer virus / Avira / Zero-day

C A S E S T U DY Enterprise Elementary School District expels malware Malwarebytes Endpoint Security keeps staff PCs clean, digital curriculum flowing, and students learning

Add to Reading List

Source URL: www.malwarebytes.com

Language: English - Date: 2016-08-19 18:33:39
UPDATE