Capability Theory by Sound Bytes
Abstraction Mechanisms for Access Control shows how capabilities are ... Mark Miller gives this Security Taxonomy, and his capabilities based language E. ...
http://www.cap-lore.com/CapTheory/index.html
popularity:
security
capabilities
os
research
capability
papers
software
programming
theory
transaction
|
CERT-In:Indian Computer Emergency Response Team
The Indian Computer Emergency Response Team (CERT-In) has been established by the Department of Information Technology to be a part of the international CERT ...
similarity:
popularity:
india
security
cert
internet
computer
computers
cert-in
team
response
software
|
Products and Services - Greatis Software
Products include the teXtreme Text Editor, RegRun Light a Windows Startup Manager, and more.
similarity:
popularity:
security
tools
windows
software
utilities
privacy
delphi
system
virus
tool
|
Security-Enhanced Linux - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
security
linux
selinux
nsa
kernel
wikipedia
wiki
unix
mac
os
|
Anti-Cross Site Scripting
AntiXSS has been completely rewritten with performance in mind, and yet retains ... fundamental protection from XSS attacks that you have come to rely on ...
similarity:
popularity:
security
xss
asp.net
.net
microsoft
tools
programming
library
hacking
scripting
|
Movable Type — Information Design & Management
Movable Type has a wide-ranging portfolio of ... Movable Type Ltd. 31 York Terrace, Cambridge CB1 2PR. info @ movable-type.co.uk. 01223 305774. 07973 559336 ...
similarity:
popularity:
javascript
security
encryption
programming
hashing
cryptography
gps
crypto
lib
software
|
threatpost | The First Stop for Security News
No information avaiable
similarity:
popularity:
security
news
blog
internet
computer
network
networking
|
www.virus.gr - Antivirus tips, virus information, removals, free support and much more!
www.virus.gr :: Αντιβιοτικά προγράμματα και προστασία για τον Η/Υ σας, Συγκριτικά αντιβιοτικών, πληροφορίες για ιούς.
similarity:
popularity:
antivirus
security
virus
anti-virus
software
|
Forensics Wiki
No information avaiable
similarity:
popularity:
security
forensics
wiki
forensic
tools
reference
computer
recovery
software
hacking
|
Gemplus products, solutions and services
No information avaiable
similarity:
popularity:
smartcard
security
rfid
smartcards
development
programming
job
partnership
|
Java Web services: WS-Security with CXF
No information avaiable
similarity:
popularity:
cxf
security
ws-security
webservice
java
development
tutorial
programming
webservices
software
|