software security

Results: 17991



#Item
601Microsoft / Software / Webmail / Computing / Password / Security / Outlook.com / Email / Login

Website NKC AFRICAN ECON OMICS Our corporate website and research portal.

Add to Reading List

Source URL: nkc.co.za

Language: English - Date: 2016-06-27 06:34:00
602Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Trusteer / Avira / Computer virus / IObit / Your PC Protector

C A S E S T U DY Allied Food gives malware a to-go package Restaurant operator supports PCI compliance with Malwarebytes Business profile

Add to Reading List

Source URL: www.malwarebytes.com

Language: English - Date: 2016-08-19 18:33:39
603Prevention / Computing / Software engineering / Software requirements / Computer security / ISO/IEC 27001:2013 / Requirement / Information security

Model Operating Requirements - Guidance Notes - Version 2 Date of Issue: June 2014

Add to Reading List

Source URL: www.arnecc.gov.au

Language: English - Date: 2015-12-09 20:41:51
604Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Avira / IObit

C A S E S T U DY Vermeer deploys industrial-strength anti-malware detection The security team uses Malwarebytes Endpoint Security to remediate and prevent new malware infections while simplifying remote monitoring and s

Add to Reading List

Source URL: nl.malwarebytes.com

Language: English - Date: 2016-07-07 18:38:56
605Software / Computing / Smartphones / IOS / ITunes / IOS jailbreaking / Mobile device management / Arxan Technologies / Mobile security / App store / Mobile app / IPhone

Arxan Best Practices White Paper An iOS Mobile Application Protection Solution Tagline Font:

Add to Reading List

Source URL: www.arxan.com

Language: English - Date: 2016-08-01 23:51:16
606Computing / Java platform / Cross-platform software / Java / Java applet / Humancomputer interaction / Applet / User / Computer security / Usability

Safe Staging for Computer Security Alma Whitten University of California at Berkeley School of Information Management & Systems 102 South Hall #4600 Berkeley, CA

Add to Reading List

Source URL: www.andrewpatrick.ca

Language: English - Date: 2003-02-05 13:13:04
607Backup software / Business continuity and disaster recovery / Backup / Data security / President of the United States

441 Freedom Parkway NE Atlanta, GAhttp://www.jimmycarterlibrary.gov Records of the Appointments/Scheduling/Advance Office: A Guide to Its Records at the Jimmy Carter Library

Add to Reading List

Source URL: jimmycarterlibrary.gov

Language: English - Date: 2016-03-30 03:51:38
608Computing / Technology / Security / Software engineering / Product development / Quality / Specification / Technical communication / Business Process Execution Language / Computer security

Outline Choreography Specification Language Security Policy Specification Language Enforcement Approach Conclusion

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:26
609Software / Computing / Cyberwarfare / Computer network security / Internet Standards / Multi-agent systems / Spamming / Transmission Control Protocol / Skype / Botnet / Transport Layer Security / Network packet

Two Methods for Detecting Malware Maciej Korczyński, Gilles Berger-Sabbatel, and Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory UMR, rue de la Passerelle, BPSaint

Add to Reading List

Source URL: mkorczynski.com

Language: English - Date: 2015-02-15 17:10:50
610Multilevel security / John Rushby / Lynx Software Technologies / Milliradian / Mill / Assurance services / Computing / Software / Technology

MILS Research and Development: Accomplishments and Ongoing Work Rance DeLong∗ November 15, 2011 Abstract

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
UPDATE