software security

Results: 17991



#Item
981

Verifying implementations of security protocols by refinement Nadia Polikarpova1 and Michał Moskal2 1 Chair of Software Engineering, ETH Zurich, Switzerland

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2016-01-20 16:21:29
    982Content management systems / Information management / Portal software / Records management / SharePoint / WebDAV / Outlook.com / World Wide Web / Microsoft Office / Microsoft InfoPath

    SharePoint Security Overview Description * Members (Contribute)

    Add to Reading List

    Source URL: www.thorprojects.com

    Language: English - Date: 2015-07-23 14:16:45
    983Content-control software / Webroot / Computer security / Malware / Software / Computing / Webroot Internet Security Complete

    PROGRAM BRIEF Channel Edge ®

    Add to Reading List

    Source URL: webroot-cms-cdn.s3.amazonaws.com

    Language: English
    984Causality / Conditionals / Philosophy of science / Carnegie Mellon University / Email / Communications protocol / Vulnerability

    Actual Causes of Security Violations (Extended Abstract) Anupam Datta Dilsun Kaynar Divya Sharma Arunesh Sinha Carnegie Mellon University Carnegie Mellon University Carnegie Mellon University Carnegie Mellon University

    Add to Reading List

    Source URL: software.imdea.org

    Language: English
    985Information technology management / Information technology / Management / Computing / Systems engineering / Method engineering / IEEE standards / Security / Change management / ITIL / Business requirements / Software maintenance

    Microsoft Word - Sample IT Change Management Policies and Procedures Guide.doc

    Add to Reading List

    Source URL: it.mst.edu

    Language: English - Date: 2016-05-16 11:34:55
    986

    OT partners with Mondaine to offer watch contactless payments Colombes, France, March 17, 2016 Oberthur Technologies (OT), a leading global provider of embedded security software products and services, today announced it

    Add to Reading List

    Source URL: www.oberthur.com

    Language: English - Date: 2016-03-17 05:51:41
      987Computer security / Computing / Security / Cyberwarfare / Cybercrime / Content-control software / Webroot / International Multilateral Partnership Against Cyber Threats

      Are organizations completely ready to stop cyberattacks? A research survey details the security perspective of IT decision makers in the US, UK, and Australia on resourcing,

      Add to Reading List

      Source URL: www.webroot.com

      Language: English - Date: 2016-03-23 12:30:21
      988Computing / Software / Cyberspace / Spamming / Social networking services / Computer network security / Cybercrime / E-commerce / Twitter / Vulnerability / Computer security / Botnet

      A Categorization Scheme for Socialbot Attacks In Online Social Networks Silvia Mitter Knowledge Technologies Institute Graz University of Technology, Austria

      Add to Reading List

      Source URL: claudiawagner.info

      Language: English - Date: 2013-08-25 09:03:46
      989Computing / Security / 107th United States Congress / Patriot Act / Cloud computing / Search engine optimization / Computer security

      Customer Spotlight TM Patriot Technologies, Inc. provides secure, tailored hardware and software solutions to global customers. Patriot addresses all aspects of the technology

      Add to Reading List

      Source URL: www.contentmx.com

      Language: English - Date: 2015-11-30 12:40:31
      990Antivirus software / Sophos / Intel Security / Symantec / Endpoint security / Kaspersky Lab / Lumension Security

      #TEST September 2015

      Add to Reading List

      Source URL: i.crn.com

      Language: English - Date: 2016-05-23 11:07:27
      UPDATE