software security

Results: 17991



#Item
861Cyberwarfare / Cryptography / Crime prevention / National security / Computer network security / Dropper / Denial-of-service attack / Backdoor / Intel / Computer security / Malware / Recreational Software Advisory Council

SESSION ID: SPO1-T09 Christiaan Beek Disrupting Adversarial Success— Giving the Bad Guys No Sleep

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2016-02-28 09:30:14
862Computer network security / Computer security / Software architecture / Data security / Web application security / Firewall / Application security / Web application / Application firewall / Application server

Microsoft PowerPoint - ISSA Dallas Presentation.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:23
863Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Secure communication / Agile software development / Vulnerability / Application security / Software bug / Software

roguewave_automotive-developer-guide2016_vf

Add to Reading List

Source URL: www.roguewave.com

Language: English - Date: 2016-03-09 11:01:17
864ERP software / SAP ERP / SAP Business Suite / Enterprise resource planning / SAP SE / SAP NetWeaver / Draft:ERP Security

Enterprise Resource Planning Courses

Add to Reading List

Source URL: erp.mst.edu

Language: English - Date: 2016-04-08 02:53:59
865Payment systems / Tokenization / Payment processor / Merchant account / Credit card / Payment Card Industry Data Security Standard / Card security code / EWay / Payment card industry / Payment card / Automated Clearing House

Credit Card Extension Enhance Microsoft Dynamics® GP with integrated credit card processing. Secure credit card processing software

Add to Reading List

Source URL: www.goerpcloud.com

Language: English - Date: 2014-02-19 16:58:47
866Software testing / Computer network security / Hacking / Vulnerability / GrammaTech / Computer security

Securely Taking on New Executable Software of Uncertain Provenance (STONESOUP) Neutralizing Exploitable Vulnerabilities in Software Program Manager: Mr. W. Konrad Vesey; E-mail: How can we benefit

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2015-10-27 14:35:32
867Computer network security / Software testing / Hacking / Computer security / Veracode / Common Weakness Enumeration / Vulnerability / Application security / Security testing / Software quality / CVSS / Software bug

Veracode Summary Report Summary Report As of 18 Mar 2016 Prepared for: Prepared on:

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2016-04-06 15:04:57
868Computer security / Hacking / Software testing / Computer network security / Attack patterns / Recommender system / Text mining / Event correlation / Data mining / CAPEC / Intrusion detection system / Information security operations center

Mining known attack patterns from security-related events Nicandro Scarabeo1,2 , Benjamin C.M. Fung3 and Rashid H. Khokhar4 1 Department of Electrical and Information Engineering, University of Cassino and Southern Lazi

Add to Reading List

Source URL: peerj.com

Language: English - Date: 2015-10-07 04:49:41
869Software bugs / Cryptography / Programming language implementation / National security / Memory safety / Software engineering / Vulnerability / Mbed TLS / Computer security / Computer memory / Pointer

Purdue University - Department of Computer Science Data Confidentiality and Integrity Scott A. Carr and Mathias Payer Motivation: void vulnerable() {

Add to Reading List

Source URL: scottandrewcarr.com

Language: English - Date: 2016-08-06 23:54:07
870Geolocation / Privacy / Smartphones / Internet privacy / Location-based service / Mobile app / Android / Mobile phone tracking / Privacy concerns with social networking services / Mobile security

PRIVACY POLICY IHC REPORTER APP This privacy policy governs your use of the software application Reporter App (“Application”) for mobile devices that was created by IHC Merwede. The Application is used to create dred

Add to Reading List

Source URL: www.dredgetraining.com

Language: English - Date: 2013-11-14 05:25:52
UPDATE