software security

Results: 17991



#Item
771Hacking / Software testing / Vulnerability / Computer security

Schedule UbiCrypt Summer School SYSTEMS SECURITY| July 20-23, 2015 Time 08:30-09:00 09:00-10:30 10:30-11:00 11:00-12:30

Add to Reading List

Source URL: www.ubicrypt.hgi.rub.de

Language: English - Date: 2015-07-10 06:56:20
772Cyberwarfare / Quality assurance / Software assurance / Software quality / National Security Agency / Computer security

Department of Defense (DoD) Joint Federated Assurance Center (JFAC) Overview

Add to Reading List

Source URL: www.acq.osd.mil

Language: English - Date: 2014-10-23 17:18:12
773Infrastructure / United States Department of Homeland Security / National security / Cyberwarfare / SoftQuad Software / XMetaL / Critical infrastructure protection / Critical infrastructure / Computer security

C:rsCKS~1DatamingtQuadtaL8CCAUL~1.XML

Add to Reading List

Source URL: docs.house.gov

Language: English
774Information management / Portal software / Records management / Records management technology / SharePoint / Web part / Microsoft Commerce Server / Intranet / SharePoint Dashboard / Draft:BA Insight

Robert L. Bogue MS MVP, MCSE, MCSA:Security Keys to SharePoint

Add to Reading List

Source URL: www.thorprojects.com

Language: English - Date: 2015-07-23 12:40:06
775Computer access control / EMC Corporation / Access control / Computer security / Software distribution / RSA Security / RSA SecurID / Multi-factor authentication / Identity management / Single sign-on / Cloud computing / Provisioning

RSA Via Solution Overview

Add to Reading List

Source URL: www.rsa.com

Language: English - Date: 2016-03-14 08:22:34
776Computing platforms / Arxan Technologies / Cyberwarfare / Computer network security / .NET Framework / Malware / Computer security / Proprietary software / Cross-platform / Obfuscation / Software / Windows XP

Protecting .NET Software Applications Arxan Best Practices White Paper Arxan Technologies White Paper – Arxan protects your IP from software piracy, tampering, reverse engineering and any manner of theft. 1

Add to Reading List

Source URL: www.arxan.com

Language: English - Date: 2016-08-01 23:55:30
777Computer security / Computer network security / Application security / Software testing / Application firewall / Mobile security / Fortify Software / Vulnerability / Software as a service

1 Issue 2 1 Seismic shift needed toward application security 2 Critical differentiator

Add to Reading List

Source URL: saas.hpe.com

Language: English - Date: 2015-09-16 16:49:11
778Cross-platform software / Object-oriented programming languages / Programming languages / Java platform / Pointer / Vulnerability / Java / Computer security / Software / Computer programming / Buffer overflow / Mobile security

Building Code for Medical Device Software Security Tom Haigh and Carl Landwehr READ ON!

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2015-07-23 13:16:04
779Computer network security / Computer security / Cybercrime / National security / Antivirus software / Malware / Threat

Presentation Eric HOUDET Mission Statement: Quarkslab mission is to protect sensitive data for companies facing highly sophisticated cyber-attacks. Therefore, we provide

Add to Reading List

Source URL: www.nitec.nato.int

Language: English - Date: 2016-06-08 10:31:21
780Information technology management / National security / E-commerce / Computer network security / Computer security / Cryptography / Software / Business process management

Microsoft Word - This Time The Gathering Storm is Digital.doc

Add to Reading List

Source URL: ontopilot.com

Language: English - Date: 2016-03-21 13:58:05
UPDATE