Security posts results 46-60 from 5222

 
  • Cloud Security Guidelines for IBM Power Systems

    Cloud Security Guidelines for IBM Power Systems
    English | Mar. 2016 | ISBN: 0738441422 | 244 Pages | PDF | 10 MB
    Continue Reading

  • End to End Security with z Systems
    English | 3 Apr 2015 | ISBN: 0738454192 | 48 Pages | PDF | 1 MB
    Continue Reading
  • ESET Mobile Security & Antivirus v3.3.23.0

    ESET Mobile Security & Antivirus (Premium) v3.5.72.0 | 8 MB
    Requirements: Android 2.3 and up

    ESET Mobile Security is a premium cyber security solution that protects your smartphone and tablet.
    Continue Reading
  • Sign up now to get Two Weeks of Free Downloads!

    45 UFO 23.11.2015
  • 360 Security - Antivirus Boost v3.9.1.4879

    360 Security - Antivirus Boost v3.9.9.5278 | 14,5 MB
    Requirements: Android - Varies with device

    Protect your mobile device with 360 Mobile Security, a top of the line mobile security app designed to protect your Android phone against the latest viruses, malwares, system vulnerabilities and privacy leaks.
    Continue Reading
  • Norton Security and Antivirus Premium v3.17.0.3205

    Norton Security and Antivirus Premium v3.17.0.3205 | 20 Mb

    Requirements: Android 4.0.3+

    Norton Security & Antivirus is the all-in-one mobile security and virus protection app for your smartphone or tablet. Download the latest version of Norton’s best antivirus and malware solution for Android devices.
    ImageImageImage
    Continue Reading
  • ESET Mobile Security & Antivirus v3.3.23.0

    ESET Mobile Security & Antivirus (Premium) v3.5.71.0 | 8 MB
    Requirements: Android 2.3 and up

    ESET Mobile Security is a premium cyber security solution that protects your smartphone and tablet.
    Continue Reading
  • ESET Mobile Security & Antivirus v3.3.23.0

    ESET Mobile Security & Antivirus v3.3.23.0 | 7,6 MB
    Requirements: Android 2.3 and up

    ESET Mobile Security is a premium cyber security solution that protects your smartphone and tablet.
    Continue Reading
  • 360 Total Security 9.0.0.1115 Multilingual
    360 Total Security 9.0.0.1115 Multilingual | 48 Mb

    360 Total Security includes an antivirus scanner, a cleanup tool and a startup booster, all wrapped nicely with an intuitive GUI. Provides comprehensive protection against the latest security threats with a triple virus detection engine and so much more.
    Continue Reading
  • Juniper Networks JNCIS-ENT (JN0-343): Layer 2 Security

    Juniper Networks JNCIS-ENT (JN0-343): Layer 2 Security
    Duration: 2h 45m | Video: h264, yuv420p 1280x720 | Audio: aac, 44100 Hz, 2 ch | 442 MB
    Genre: eLearning | Language: English | Project Files
    Continue Reading
  •  Security Eye 3.3 DC 20.01.2017 + portable
    Security Eye 3.3 DC 20.01.2017 + portable | 14/34 Mb

    Security Eye is a personal surveillance system that enables you to monitor multiple IP cameras or webcams.The software offers motion detection recording, continuous and scheduled recordings. If you are using motion detection, it will automatically record (or take snapshots) when motion is detected take photos and optionally sound an alarm, send you an email or SMS notification.
    Continue Reading
  • Security for Wireless Implantable Medical Devices [Repost]

    Xiali Hei, Xiaojiang Du - Security for Wireless Implantable Medical Devices
    Published: 2013-03-25 | ISBN: 1461471524 | PDF | 45 pages | 1.26 MB

    Continue Reading
  • The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software (Developer Best Practices)

    The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software (Developer Best Practices) by Michael Howard
    English | June 28, 2006 | ISBN: 0735622140 | 348 Pages | PDF | 21 MB
    Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs”the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team guide you through each stage of the SDL”from education and design to testing and post-release. You get their first-hand insights, best practices, a practical history of the SDL, and lessons to help you implement the SDL in any development organization.

    Continue Reading

  • Nsauditor Network Security Auditor 3.0.16.0 Portable | 21.4 Mb

    Nsauditor Network Security Auditor is a network security and vulnerability scanner that allows auditing and monitoring network computers for possible vulnerabilities, checking network for all potential methods that a hacker might use to attack it and create a report of potential problems that were found. Nsauditor is a complete networking software package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more.
    Continue Reading
  • CalMAN Studio 5.2.3.1416

    Nsauditor Network Security Auditor 3.0.16.0 | 7.1 Mb

    Nsauditor Network Security Auditor is a network security and vulnerability scanner that allows auditing and monitoring network computers for possible vulnerabilities, checking network for all potential methods that a hacker might use to attack it and create a report of potential problems that were found. Nsauditor is a complete networking software package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more.
    Continue Reading
  • Security Task Manager 2.0 Multilanguage

    Security Task Manager 2.1i Multilingual + Portable | 5.7 MB

    Security Task Manager displays detailed information about all running processes (applications, DLLs, BHOs, and services). For each process, it improves on Windows Task Manager, providing a security risk rating, a process description, file path, CPU usage graph, start time, embedded hidden functions (for example keyboard monitoring, autostart entry, and browser supervision or manipulation), and process type, such as visible window, systray program, DLL, and IE plug-in. The security risk rating indicates the likelihood of the process being potential spyware, malware, a Trojan, or keylogger. It also deletes traces of your Internet and computer activity, prevents keyboard input monitoring, and warns you when the registry is changed.
    Continue Reading