software security

Results: 17991



#Item
741Computer network security / Identity theft / Antivirus software / Computer virus / Deception / Internet security / Security hacker / Hackers: Heroes of the Computer Revolution / Computer security / Hacker culture / Intel Security / Malware

A Survey Scale to Measure Computer Security Beliefs

Add to Reading List

Source URL: www.usenix.org

Language: English
742Cross-platform software / Exim / Card security code / Adverse inference

Slip OpUNITED STATES COURT OF INTERNATIONAL TRADE RZBC GROUP SHAREHOLDING CO., LTD., RZBC CO., LTD., RZBC IMP. & EXP. CO., LTD., and RZBC (JUXIAN) CO., LTD., Plaintiffs,

Add to Reading List

Source URL: www.cit.uscourts.gov

Language: English - Date: 2016-07-13 09:38:07
743Cross-platform software / Markup languages / Scripting languages / HTML / Object-oriented programming languages / Cross-site scripting / HTTP cookie / JavaScript / Form / PHP / Same-origin policy / Java

Abstracting Application-Level Web Security David Scott Richard Sharp Laboratory For Communications Engineering

Add to Reading List

Source URL: rich.recoil.org

Language: English - Date: 2006-04-13 14:58:03
744Antivirus software / Malwarebytes / Malware / Computer virus / Avira / Zero-day

C A S E S T U DY Enterprise Elementary School District expels malware Malwarebytes Endpoint Security keeps staff PCs clean, digital curriculum flowing, and students learning

Add to Reading List

Source URL: de.malwarebytes.com

Language: English - Date: 2016-07-07 18:32:31
745Software testing / Codenomicon / Fuzz testing / Computer security / Vulnerability / American fuzzy lop

Fuzzing Practical Considerations Of Fuzzing: Generating Insight into Areas of Risk Jonathan Knudsen

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-07-06 08:58:34
746Archive formats / Dpkg / Ubuntu / Debian / Package manager / Software distribution / Yellowdog Updater /  Modified / Arch Linux / Software repository / RPM Package Manager / Deb / Portage

Package Management Security Justin Cappos, Justin Samuel, Scott Baker, John H. Hartman University of Arizona Computer Science Department {justin, jsamuel, bakers, jhh}@cs.arizona.edu

Add to Reading List

Source URL: isis.poly.edu

Language: English - Date: 2012-09-11 18:21:25
747World Wide Web / Cross-platform software / File system permissions / Chmod / Setuid / Umask / Common Gateway Interface / Chroot / Apache HTTP Server / PHP / Application server / Request Tracker

Securing Apache on Unix/Linux Apache security books reviewed at http://www.apachetutor.org/security/ (and a bunch of FAQs)

Add to Reading List

Source URL: www.apachecon.com

Language: English - Date: 2011-09-21 13:50:22
748Windows Vista / Cryptographic software / Data security / Folder lock / File Explorer

Microsoft Word - Configuring JHBox for secure sharing

Add to Reading List

Source URL: www.it.johnshopkins.edu

Language: English
749Software testing / Address space layout randomization / Computer network security / Binary hardening / Code injection / SQL injection / Heap / Vulnerability / GrammaTech / Computer security

REPORT DOCUMENTATION PAGE

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2015-10-27 14:35:32
750Computer network security / Cultural globalization / Internet / New media / Telegraphy / Virtual reality / Computer security / Computing / Software / Defensive computing / Sumter County Library /  FL

Internet Access Policy Adopted by the Library Board Of Trustees Effective: March 17, 2015

Add to Reading List

Source URL: www.myepl.org

Language: English - Date: 2015-03-20 14:17:59
UPDATE