software security

Results: 17991



#Item
511Internet / Computing / Cryptography / Internet Standards / Internet protocols / Domain name system / DNSSEC / Public-key cryptography / Domain Name System Security Extensions / DNS spoofing / NSD / Comparison of DNS server software

DNSSEC Raising the Barriers against DNS exploits Olaf M. Kolkman ()

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:03
512Software / Computing / Digital media / Social media / Social networking services / New media / Web 2.0 / Economy of Oregon / Pacific Northwest Economic Region / Twitter / Computer security

1 Social Media Grant  FEMA Port Security Grant, FY08 & FY12, Enhancing Maritime Security by Engaging Emergency Preparedness/Response Partners and the Public

Add to Reading List

Source URL: www.regionalresilience.org

Language: English - Date: 2016-04-26 13:56:02
513Computer security / Computing / Query languages / Cloud computing / Hadoop / Apache Software Foundation / Pig / Blacklist / Whitelist / TiVo Corporation

Administration Table of contents 1 Output location strict check............................................................................................... 2 2 Disabling Pig commands and operators.....................

Add to Reading List

Source URL: pig.apache.org

Language: English - Date: 2015-06-06 13:03:20
514Computing / Cloud computing / Cloud infrastructure / Cloud storage / Software as a service / Cloud computing issues / Cloud computing security

Are enterprises really ready to move into the cloud? By Sichao Wang Many businesses are interested in finding out how they can benefit from the cloud computing hot wave. Cloud based services such as Saas, Paas and Iaas,

Add to Reading List

Source URL: cloudsecurityalliance.org

Language: English - Date: 2015-04-27 14:00:33
515Artificial intelligence / Humancomputer interaction / User interface techniques / Software / Activity recognition / Cognition / Gesture recognition / Mobile security / Speech recognition

High-Level Activity Recognition through Interaction Modeling and Graph Analysis Diplomarbeit submitted by

Add to Reading List

Source URL: ibug.doc.ic.ac.uk

Language: English - Date: 2016-06-16 13:15:29
516Software / Computing / Web browsers / Mozilla / Internet advertising / Hacking / Cloud clients / Browser extension / Google Chrome / Browser security / Cross-site scripting / Firefox

2015 IEEE Symposium on Security and Privacy Ad Injection at Scale: Assessing Deceptive Advertisement Modifications  

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:06
517Computer security / Computing / Security / Veracode / Software testing / Application security / Vulnerability / Cloud computing

HIGHLIGHTS A state government meets compliance requirements and reduces risk in a scalable application

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2015-06-03 10:46:07
518Software / System software / Computer security / Antivirus software / Avast Software / Intel Security / Computer virus / Avira / Clam AntiVirus / F-Secure

- CloudAV N-Version Antivirus in the Network Cloud Jon Oberheide, Evan Cooke, Farnam Jahanian

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-11 18:23:52
519Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Avira / Computer virus / Zero-day

C A S E S T U DY Knutson Construction builds better malware defenses Minnesota construction company uses Malwarebytes Anti-Malware to clean up serious malware outbreak

Add to Reading List

Source URL: pl.malwarebytes.com

Language: English - Date: 2016-07-07 18:40:15
520System software / Software / Computer architecture / System administration / Setuid / Su / File system permissions / Passwd / Password / Home directory / Chsh / Fstab

Linux Security Paul Cobbaut Linux Security Paul Cobbaut Paul Cobbaut

Add to Reading List

Source URL: linux-training.be

Language: English - Date: 2015-05-24 09:28:07
UPDATE