software security

Results: 17991



#Item
721Dell / WebCT / Internet / Application software / Email / Computer security / Computing / Computer network

Information Technologies 2010 Networks . Platforms . Applications . Classroom Technologies . Support . Security & Quality U Bainbridge Bunting MemorialUNM’s

Add to Reading List

Source URL: cio.unm.edu

Language: English - Date: 2013-09-25 13:28:57
722Internet privacy / Internet security / Internet protocols / Content-control software / Secure communication / Proxy server / Internet censorship / Deep packet inspection / Compagnies Rpublicaines de Scurit / Tor / Internet / HTTP 404

Proceedings on Privacy Enhancing Technologies ; ):37–61 Sheharbano Khattak*, Tariq Elahi*, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, and Ian Goldberg SoK: Making Sense of Censorship Resistance Syst

Add to Reading List

Source URL: sec.cs.ucl.ac.uk

Language: English - Date: 2016-07-19 04:21:03
723Internet advertising / Computer network security / Human rights / Internet privacy / Ad blocking / Privacy / Computer security

eBlocker kicks off on Indiegogo and involves community in software optimization • • Starting August 10th, eBlocker launches the early access version of its

Add to Reading List

Source URL: www.eblocker.com

Language: English - Date: 2015-08-03 12:18:13
724Antivirus software / Malwarebytes / Malware / Avira / IObit

C A S E S T U DY Vermeer deploys industrial-strength anti-malware detection The security team uses Malwarebytes Endpoint Security to remediate and prevent new malware infections while simplifying remote monitoring and s

Add to Reading List

Source URL: pl.malwarebytes.com

Language: English - Date: 2016-07-07 18:40:15
725Antivirus software / Malwarebytes / Malware / Zero-day / Avira

C A S E S T U DY When it comes to malware defense, Gilbane Building Company nails it Gilbane crushes malware and exploits on its endpoints with Malwarebytes Endpoint Security

Add to Reading List

Source URL: pt.malwarebytes.com

Language: English - Date: 2016-07-07 18:41:23
726Domain name system / Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Unbound / NSD / Comparison of DNS server software / BIND / Name server / NLnet

DNSSEC software at NLnet Labs Jelte Jansen http://www.nlnetlabs.nl/

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:02
727Cyberwarfare / Computer network security / Computer security / National security / Cryptography / Denial-of-service attack / Malware / Threat / Information security / Vulnerability / Antivirus software / Kaspersky Lab

Available online at www.postmodernopenings.com e-ISSN: 2069–9387; ISSN–L: 2068–0236 Postmodern Openings 2016, Volume 7, Issue 1, June, pp

Add to Reading List

Source URL: postmodernopenings.com

Language: English - Date: 2016-06-27 06:38:15
728Computer network security / Computer security / Hacking / Software testing / Vulnerability / Application security / Web application firewall

Microsoft PowerPoint - VulnerabilityManagementInAnApplicaitonSecurityWorld_OWASPMSP_20090316.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:43
729Tablet computers / OS X / Cross-platform software / Steve Jobs / Mach / FileMaker / Bento / Lasso / IPad / Macintosh / Transport Layer Security / MobileMe

 Next Meeting — General Meeting — June 15th, 2010, 6:30 PM Volume 29, Issue 6 • June 2010

Add to Reading List

Source URL: www.dvmug.org

Language: English - Date: 2015-07-29 20:56:12
730ERP software / OpenTravel Alliance / SAP SE / Societates Europaeae / Information security / SAP R/3 / Systems Applications Products audit

SAPT0.01 Information Resources – Acceptable Use Approved: Revised: Revised: Next Scheduled Review:

Add to Reading List

Source URL: www.tarleton.edu

Language: English - Date: 2016-08-16 11:06:20
UPDATE