software security

Results: 17991



#Item
671Computer network security / Cybercrime / Cyberwarfare / Rogue software / Computer security / Cryptography / Zero-day / Malware / Computer virus / Vulnerability / Rogue security software / Symantec

Facing the Cyber Threat: The Need for a Paradigm Change in Cyber Security Ammar Alkassar, CEO Rohde & Schwarz Cybersecurity May, 9th 2016, Tallinn | NCI Agency Industry Conference and AFCEA TechnNet International

Add to Reading List

Source URL: www.nitec.nato.int

Language: English - Date: 2016-06-08 11:00:48
672Cisco Systems / Deep packet inspection / Videotelephony / Transmission Control Protocol

Complex Paths and Derelict Sentinels software engineering underpinnings of recent NTP vulnerabilities Matthew Van Gundy <> Technical Leader, Cisco Advanced Security Initiatives Group (ASIG) LangSec Work

Add to Reading List

Source URL: spw16.langsec.org

Language: English - Date: 2016-06-06 10:44:10
673Cybercrime / Ransomware / Social engineering / Cryptography / Antivirus software / Malware / Phishing / Scareware / Computer virus / Computer security / Draft:Locky / TorrentLocker

INFOGRAPHIC - MalwareBytes - Ransomware Infographic UPDATE

Add to Reading List

Source URL: es.malwarebytes.com

Language: English - Date: 2016-07-07 12:58:17
674Software requirements / Systems engineering / Product development / Project management / Software development / Computer security / Functional requirement / Modularity / Requirement

EXPRESSION OF INTEREST (EOI) On Re-engineering of PPIS

Add to Reading List

Source URL: dppr.gov.np

Language: English
675Cloud clients / Portable software / Sandbox / FreeBSD / Unix / Inetd / Chromium / Ioctl / Capability-based security / Google Chrome / Capsicum / Operating system

Capsicum working group Robert N.M. Watson University of Cambridge FreeBSD Developer Summit

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-07-21 06:37:47
676Antivirus software / Malwarebytes / Malware / Avira / IObit

C A S E S T U DY Cambria Countyprevents malware emergencies Malwarebytes Endpoint Security sounds the alarm, stopping exploits before they cause problems

Add to Reading List

Source URL: de.malwarebytes.com

Language: English - Date: 2016-07-07 18:32:31
677Domain name system / Internet Standards / Internet protocols / Cyberwarfare / Computer network security / Domain Name System Security Extensions / Denial-of-service attack / Dan Kaminsky / Cloudmark / Internet security / Computer security / Comparison of DNS server software

Telecom/Datacom Market Fundamental Drivers

Add to Reading List

Source URL: www.cloudmark.com

Language: English - Date: 2014-11-13 13:40:39
678Ambient intelligence / Internet of things / Computer security / Machine to machine / Windows XP / Wind River Systems

Press Release Internet of Things Propels Embedded Software Security to New Heights, According to VDC Research Demand for security software is rising as device makers increasingly recognize the importance of security for

Add to Reading List

Source URL: www.vdcresearch.com

Language: English - Date: 2016-02-01 13:56:02
679Risk / Vulnerability / Security / Actuarial science / Hazard analysis / Social vulnerability / Hazard / Vulnerability assessment / Disaster / HAZUS / Reliability engineering

Environmental Modelling & Software156e169 Contents lists available at ScienceDirect Environmental Modelling & Software journal homepage: www.elsevier.com/locate/envsoft

Add to Reading List

Source URL: homepage.univie.ac.at

Language: English - Date: 2015-06-01 23:03:25
680Network architecture / Emerging technologies / Network function virtualization / Telecommunications systems / Computer network security / Outsourcing / Software-defined networking / Customer-premises equipment / Virtual private network / Cloud computing / Call centre / Customer experience

Technical Brief Randy Levensalor, Lead Architect, CableLabs, March 2016

Add to Reading List

Source URL: www.cablelabs.com

Language: English - Date: 2016-04-25 12:06:13
UPDATE