software security

Results: 17991



#Item
701Computer security / Computer network security / Hacking / Software testing / Vulnerability / OWASP / Cross-site scripting / Software quality / Application security / Software / Security / HDIV

Microsoft PowerPoint - DenimGroup_IntroductionToApplicationSecurity.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:17:45
702Spamming / Email spam / Anti-spam techniques / MessageLabs / Email / Internet security / Botnet / Bagle / Antivirus software / Phishing / Computer virus / Storm botnet

Be certain MessageLabs Intelligence: October 2006 “Do you want spam with that spam?” Introduction

Add to Reading List

Source URL: londonactionplan.org

Language: English - Date: 2016-04-26 15:59:23
703Password / Security / Double-click / Windows Vista

Setting up the Product on a personal computer*  * OS: Windows® XP, Windows Vista®, Windows® 7, Windows® 8  (1) Download the latest FlashAir™ configuration software (Ver.2.00 or later) fro

Add to Reading List

Source URL: www.toshiba.co.jp

Language: English - Date: 2013-07-31 22:51:16
704United States Department of Homeland Security / XMetaL / Homeland Security Act / SoftQuad Software / Homeland security / Definitions of terrorism / Presidential directive / Food defense

C:rsCKS~1DatamingtQuadtaL8ONOVA~1.XML

Add to Reading List

Source URL: docs.house.gov

Language: English
705Antivirus software / Content-control software / Webroot / Freeware / Rogue software / Malware / Computer virus / Avira / Spyware / Webroot Antivirus with Spy Sweeper / Webroot Internet Security Essentials

Reports and Files Download

Add to Reading List

Source URL: www.hsbcnet.com

Language: English - Date: 2015-07-02 02:18:35
706Antivirus software / Malwarebytes / Malware / Zero-day / Check Point

C A S E S T U DY Faith Regional Health Services inoculates itself against malware Healthcare provider blocks malware and exploits with Malwarebytes Endpoint Security Business profile

Add to Reading List

Source URL: ru.malwarebytes.com

Language: English - Date: 2016-07-06 12:46:25
707Computing platforms / Software metrics / Linux kernel / LLVM / Clang / Linux / Kernel / Source lines of code / Compiler / Mach

Research Report: Analysis of Software for Restricted Computational Environment Applicability Jacob I. Torrey and Jonathan Miodownik Assured Information Security Greenwood Village, CO, USA {torreyj, miodownikj}@ainfosec.c

Add to Reading List

Source URL: spw16.langsec.org

Language: English - Date: 2016-06-05 23:38:45
708Antivirus software / Rogue software / Malwarebytes / Scareware / Malware / Computer virus / Ransomware / Rogue security software / IObit

C A S E S T U DY At United Bank, there is no payoff for ransomware Bank uses Malwarebytes to prevent malware and exploits from cashing in Business profile

Add to Reading List

Source URL: ru.malwarebytes.com

Language: English - Date: 2016-07-06 12:46:25
709Internet advertising / Rogue software / Adware / Computer network security / Identity theft / Spyware / Claria Corporation / Icon

A Proposal For Mandatory Software Labeling

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English
710Antivirus software / Malwarebytes / Malware / Zero-day / Check Point

C A S E S T U DY Faith Regional Health Services inoculates itself against malware Healthcare provider blocks malware and exploits with Malwarebytes Endpoint Security Business profile

Add to Reading List

Source URL: it.malwarebytes.com

Language: English - Date: 2016-07-06 12:38:04
UPDATE