software security

Results: 17991



#Item
641Computing / Internet / Network architecture / Internet Standards / Internet protocols / Computer network security / RADIUS / Transport Layer Security / IEEE 802.1X / AirMarshal / OpenVPN / Wireless security

VersionIEA Software, Inc. Software License Agreement By purchasing or installing Air Marshal Authentication Gateway, you indicate your acceptance

Add to Reading List

Source URL: www.iea-software.com

Language: English - Date: 2015-05-12 23:32:47
642Software / Freeware / Portable software / Password / Security / Educational technology / Web application / Mobile device

CYBERWISE A2 PRIMARY POSTER

Add to Reading List

Source URL: www.learningexchange.nsw.edu.au

Language: English - Date: 2015-05-06 23:43:35
643Cyberwarfare / Computing / Computer security / Computer network security / National security / Cryptography / Denial-of-service attack / Malware / Threat / Information security / Vulnerability / Antivirus software

Available online at www.postmodernopenings.com e-ISSN: 2069–9387; ISSN–L: 2068–0236 Postmodern Openings 2016, Volume 7, Issue 1, June, pp

Add to Reading List

Source URL: drwho.virtadpt.net

Language: English - Date: 2016-07-04 18:56:05
644Security / Cyberwarfare / Computer security / Cybercrime / Hacking / National security / Cooperative Cyber Defence Centre of Excellence / Cyber-attack / Stuxnet / Jason Healey / Mandiant / Jeffrey Carr

Software Manufacturer Liability JEFFREY CARR RESPONSIBLE ATTRIBUTION: A PREREQUISITE FOR ACCOUNTABILITY

Add to Reading List

Source URL: ccdcoe.org

Language: English - Date: 2016-08-12 06:44:11
645Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Computer virus / Avira / Zero-day

C A S E S T U DY Enterprise Elementary School District expels malware Malwarebytes Endpoint Security keeps staff PCs clean, digital curriculum flowing, and students learning

Add to Reading List

Source URL: pl.malwarebytes.com

Language: English - Date: 2016-07-07 18:40:15
646Backup software / Business continuity and disaster recovery / Computing / Backup / System software / Software / Cloud storage / Data security / Remote backup service / Server

CLIENT SUCCESS STORY PROTRAVEL INTERNATIONAL KNOWS FROM EXPERIENCE THAT THEIR DATA IS SAFE AND EASILY RETRIEVABLE WITH KeepItSafe THE CHALLENGE “When you’re panicked

Add to Reading List

Source URL: www.keepitsafe.ca

Language: English - Date: 2016-08-18 06:15:35
647Computer network security / Computer security / Cyberwarfare / Computing / Data security / Firewall / Network management / Antivirus software

Classics Department Computing Resources Guide This document is intended to provide quick guidance for new faculty, new graduate students, and research visitors in Classics and AHMA. Table of Contents CalNet ID—the esse

Add to Reading List

Source URL: ucbclassics.dreamhosters.com

Language: English
648Computing / Computer security / Cyberwarfare / Hacking / Computer network security / Software testing / Vulnerability / OWASP / Secure coding / Application security / Cross-site scripting / Defensive programming

Combating the Top 4 Sources of Software Vulnerabilities

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2016-07-20 15:52:45
649Computing / Software / Internet / Domain name system / Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Unbound / NSD / Comparison of DNS server software

DNSSEC software at NLnet Labs Jelte Jansen http://www.nlnetlabs.nl/

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:02
650Computing / Network architecture / Computer networking / Crime prevention / Cryptography / National security / Network segmentation / Virtual firewall / Data center / Check Point / Computer security / Information security

Whitepaper Unlock the full potential of data center virtualization with micro-segmentation Making software-defined security (SDS) work for your data center It’s time to unlock the full potential

Add to Reading List

Source URL: www.nttsecurity.com

Language: English - Date: 2016-07-26 13:04:40
UPDATE