software security

Results: 17991



#Item
541Security / Access control / Computer security / Computer access control / Social information processing / Role-based access control / PERMIS / Web 2.0 / Social software / Attribute-Based Access Control

Journal of Information Assurance and Security. ISSNVolumeppc MIR Labs, www.mirlabs.net/jias/index.html Enhanced Sharing and Privacy in Collaborative

Add to Reading List

Source URL: www.infosys.tuwien.ac.at

Language: English - Date: 2012-06-04 07:35:14
542Software engineering / Computer programming / Computing / Query languages / Functional languages / Object-oriented programming languages / Scripting languages / SQL / Datalog / Prolog / Closure / Objective-C

Finding Application Errors and Security Flaws Using PQL: a Program Query Language Michael Martin Benjamin Livshits

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2005-08-16 13:28:19
543Emerging technologies / Computing / Network architecture / Cloud infrastructure / Cloud computing / Technology / Internet of things / Network function virtualization / Software-defined networking / 9 / Cloud computing issues

NETEVENTS APAC PRESS & SERVICE PROVIDER VIP SUMMIT Draft Innovation in the Cloud & the Importance of Security Guest Speaker: Steve Chappell, Chief Operating Officer, Wedge

Add to Reading List

Source URL: www.netevents.org

Language: English - Date: 2015-06-04 08:03:01
544Smart cards / PGP / Software / Computer security / Cryptography / Cryptographic software / Privacy software / Cross-platform software / GNU Privacy Guard / ISO/IEC / OpenPGP card

Functional Specification of the OpenPGP application on ISO Smart Card Operating Systems

Add to Reading List

Source URL: www.g10code.de

Language: English - Date: 2015-11-01 10:38:20
545Computing / Software / Smartphones / Computer architecture / Cloud clients / Mobile operating systems / Alphabet Inc. / Android / IOS / Proprietary software / Mobile security / Copyright

© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. The incident response playbook: For Android and iOS Andrew Hoog

Add to Reading List

Source URL: files.sans.org

Language: English - Date: 2016-07-11 10:53:34
546Computing / Business / Economy / Computer network security / Cybercrime / Identity theft / Internet advertising / Rogue software / Spyware / Computer security / Computer repair technician / Antivirus software

www.agjsystems.com “16 Critical Questions You MUST Ask Before Hiring Any IT Company” If You Depend On Your Computer Network To Run Your Business, This Is One Guide You DON’T Want To Overlook!

Add to Reading List

Source URL: d2oc0ihd6a5bt.cloudfront.net

Language: English - Date: 2016-04-13 23:37:50
547Software / Computer security / System software / Antivirus software / Malwarebytes Anti-Malware / Malwarebytes / Malware / Avira / Zero-day / Computer virus / IObit

C A S E S T U DY SCB builds a defense against malware Architecture firm takes preventive approach to malware with Malwarebytes Anti-Malware and gains dramatic time savings Business profile

Add to Reading List

Source URL: www.malwarebytes.com

Language: English - Date: 2016-08-19 18:33:39
548Videotelephony / Computer-mediated communication / Teleconferencing / Technology / Web conferencing / Computing / Remote administration software / WebEx / Cisco Systems / Videoconferencing / Teleconference / Password

White Paper Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration This paper focuses on security information for Cisco WebEx Meeting Centre, Cisco WebEx Training Centre, Cisco WebEx Support Centre and C

Add to Reading List

Source URL: www.webex.com.au

Language: English - Date: 2016-04-05 23:55:43
549Computing / Security / Prevention / Crime prevention / Cryptography / Information governance / National security / Data security / Computer security / Software / Certified Information Systems Security Professional / Information security

Microsoft PowerPoint - DenimGroup_PermanentCampaign_DenverISSA_20091021.pptx

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:17:59
550Software / Cyberwarfare / Security / Prevention / Server / Computer security / Denial-of-service attack / Password / EVS / Git

Fireaxe: The DHS Secure Design Competition Pilot [Extended Abstract] Yevgeniy Vorobeychik, Michael Z. Lee, Adam Anderson, Mitch Adair, William Atkins, Alan Berryhill, Dominic Chen, Ben Cook, Jeremy Erickson, Steve Hurd,

Add to Reading List

Source URL: www.dcddcc.com

Language: English - Date: 2016-08-05 04:38:11
UPDATE