software security

Results: 17991



#Item
681Computer viruses / Comparison of computer viruses / Antivirus software / Robert Slade / Goodtimes virus / Michelangelo / SCA / Macro virus / Security hacker / Hare / Multipartite virus / Tuxissa

COMPUTER VIRUSES AND “FALSE AUTHORITY SYNDROME” 4TH EDITION © 1995,97 ROB ROSENBERGER; ALL RIGHTS RESERVED. INTERNET E-MAIL: WORLD WIDE WEB: http://www.kumite.com/myths ABSTRACT .......................

Add to Reading List

Source URL: vmyths.com

Language: English - Date: 2011-02-22 23:43:56
682Computer security / IT risk management / Information assurance / Logic Pro / Department of Defense Information Assurance Certification and Accreditation Process / Request Tracker / Software testing / Windows 8

highresRT_Logic-Kratos_Logo

Add to Reading List

Source URL: www.rtlogic.com

Language: English - Date: 2016-08-09 00:40:02
683OpenVAS / Crime prevention / Cryptography / Information governance / National security / Computer security / Vulnerability / Free software / Munich

Greenbone Case Study Vulnerability Management German Armed Forces University, Munich (Universität der Bundeswehr München) Greenbone Security Manager:

Add to Reading List

Source URL: greenbone.net

Language: English - Date: 2016-08-19 11:06:48
684ISO standards / Fashion / Swatch / The Swatch Group / Contactless payment / Near field communication / Oberthur Technologies

OT partners with Swatch to offer contactless payment in Brazil Colombes, France, July 18, 2016 OT (Oberthur Technologies), a leading global provider of embedded security software products and services, announces a key pa

Add to Reading List

Source URL: www.oberthur.com

Language: English - Date: 2016-07-18 05:20:18
685Oracle Corporation / Redwood City /  California / Oracle Database / Federal Information Security Management Act / Accounting software / Invoice processing / Comparison of PSA systems

OVERVIEW/ SUMMARY OF SERVICES

Add to Reading List

Source URL: arc.publicdebt.treas.gov

Language: English - Date: 2016-05-06 08:37:11
686Payment systems / E-commerce / Business software / Banking / Cheque / Numismatics / Payment / Point of sale / Bank / Overdraft / Clearing / Computer security

Transaction Services 9 October 2013 Technology Architecture & Strategy

Add to Reading List

Source URL: hpts.ws

Language: English - Date: 2013-10-09 03:12:04
687Antivirus software / Bitdefender / Avira / Avast Software / Malware / Intel Security / Computer security / Computer virus / Cache

- Virtualized In-Cloud Security Services for Mobile Devices Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, Jason Flinn, Farnam Jahanian

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-11 18:23:18
688Alphabet Inc. / Cloud applications / Google Docs /  Sheets /  Slides and Forms / Presentation software / Google Search / Black box / Computer security / Mobile phone / Google

Superhero’s Black Box For Emergencies… What’s in Yours? Brenda Norris Jason Letourneau

Add to Reading List

Source URL: www.nc-sis.org

Language: English - Date: 2016-02-01 15:52:48
689Cloud infrastructure / Cloud applications / Crime prevention / Cryptography / National security / Cloud computing / Shadow IT / Software as a service / Information security / Dropbox / Computer security / Cloud computing security

Thought Leadership Shining a light into Shadow IT The story of Corporate IT unsurprisingly mirrors the introduction of innovative and

Add to Reading List

Source URL: www.nttsecurity.com

Language: English - Date: 2016-07-26 13:05:28
690Computer network security / Deep packet inspection / Server appliance / Cyberwarfare / Zero-day / Malware / Check Point / Computer virus / Antivirus software / Computer security / Targeted threat

Check Point SandBlast Zero-Day Protection CHECK POINT SANDBLAST ZERO-DAY PROTECTION Detects and blocks previously undiscovered malware, taking

Add to Reading List

Source URL: www.compugraf.com.br

Language: English - Date: 2015-12-08 12:36:53
UPDATE