Search


PDF Archive search engine
Last database update: 25 October at 15:41 - Around 76000 files indexed.


Show results per page

Results for «secure»:


Total: 3000 results - 0.047 seconds

ali-razmjoo-qalaei 98%

AV BYPASS OLLYDBG ALF CUCKOO SANDBOX BINARY EXPLOITION GDB IDA PROGRAMMING LANGUAGES PYTHON (2.X, 3.X) PERL C++ ASM LUA C# CSS PHP BASH C JAVASCRIPT RUBY HTML SECURITY/PENETRATION TESTING SERVER WEB APPLICATION SERVICES OPERATING SYSTEMS CLIENT NETWORK SOCIAL ENGINEERING LOW LEVEL ANALYSIS VIRTUALIZATION VMWARE WORKSTATION PARALLELS VIRTUALBOX QEMU VMWARE ESXI VMWARE FUSION KVM OPERATING SYSTEM WINDOWS CENT OS ARCH (MANJARO) MAC OS IOS LINUX REDHAT UBUNTU FREEBSD ANDROID DATABASE MYSQL MS SQLS ERVER POSTGRESQL SQLITE MONGODB MANAGING SERVERS SECURE LINUX SERVERS CSF MONITORING WINDOWS FIREWALL PFSENSE IPTABLES BUILD UNIQUE SERVICES CREATE BACKUP SERVICES SNORT PF OTHERS GIT IPYTHON NOTEPAD++ PROJECT MANAGEMENT Last update:

https://www.pdf-archive.com/2017/09/17/ali-razmjoo-qalaei/

17/09/2017 www.pdf-archive.com

HP Cyber Risk Report 2015 98%

Well-known attacks were still distressingly effective, and misconfiguration of core technologies continued to plague systems that should have been far more stable and secure than they in fact proved to be.

https://www.pdf-archive.com/2015/03/16/hp-cyber-risk-report-2015/

16/03/2015 www.pdf-archive.com

57143695-Improving-Enterprise-Access-Security-Using-RFID 97%

This study believes that the most secure methods include storing the access information on another secure device such as a smart card, or an RFID tag.

https://www.pdf-archive.com/2011/09/14/57143695-improving-enterprise-access-security-using-rfid/

14/09/2011 www.pdf-archive.com

GPC Specification-2.2.1 97%

26 4.3.1 Secure Card Content Management ..........................................................................................................

https://www.pdf-archive.com/2017/06/09/gpc-specification-2-2-1/

09/06/2017 www.pdf-archive.com

nps71-070714-03 97%

2158), would expand these efforts by strengthening federal authority to secure the U.S.

https://www.pdf-archive.com/2015/02/22/nps71-070714-03/

22/02/2015 www.pdf-archive.com

Using RFID to Enhance Mobile Banking Security 97%

While providing , anywhere, anytime banking to the user, the service should be secure and security needs to be implemented at various levels, starting from the SIM card security, mobile software security, and secure customer access to banking services.

https://www.pdf-archive.com/2011/09/14/using-rfid-to-enhance-mobile-banking-security/

14/09/2011 www.pdf-archive.com

Cristian Lopez Security and Accessibility 97%

Secure applications are one of the methods in which vendors are making it safer for their customers to enjoy accessible and both safe services.

https://www.pdf-archive.com/2014/11/09/cristian-lopez-security-and-accessibility/

09/11/2014 www.pdf-archive.com

Craig Brown Resume 97%

 Conducted 100% inventory of 400 COMSEC accountable pieces across four COMSEC responsible officers and 3 Secure Voice Responsible officers.

https://www.pdf-archive.com/2016/09/05/craig-brown-resume/

05/09/2016 www.pdf-archive.com

SAP BI 7 Security 97%

SAP BI 7.X Security Concepts Presented By:

https://www.pdf-archive.com/2017/07/19/sap-bi-7-security/

19/07/2017 www.pdf-archive.com

Annex 1 Base Capital Requirements 97%

and either (i) carries on the business only of soliciting or accepting orders for the purchase or sale of any securities from any customer (not being a restricted broker) or (ii) accepts money or assets from any customer as settlement of, or a margin for, or to guarantee or secure, any contract for the purchase or sale of securities by that customer.

https://www.pdf-archive.com/2015/06/18/annex-1-base-capital-requirements/

18/06/2015 www.pdf-archive.com

1357620708118 97%

FREQUENTLY ASKED QUESTIONS ON DEPOSITORY SYSTEM Disclaimer:

https://www.pdf-archive.com/2014/09/01/1357620708118/

01/09/2014 www.pdf-archive.com

2014 10 07 ITSecurity development 96%

An Open, Safe and Secure Cyberspace, Brussels, 7.2.2013 JOIN(2013) 1 final http://eeas.europa.eu/policies/eu-cybersecurity/cybsec_comm_en.pdf 2.Council Resolution of 28 January 2002 on a common approach and specific actions in the area of network and information security http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32002G0216%2802%29 3.COMMISSION STAFF WORKING DOCUMENT IMPACT ASSESSMENT.

https://www.pdf-archive.com/2014/10/11/2014-10-07-itsecurity-development/

11/10/2014 www.pdf-archive.com

DCX-PPM NON-US 12 20 update 96%

CONFIDENTIAL PRIVATE PLACEMENT OFFERING MEMORANDUM NON-U.S.

https://www.pdf-archive.com/2018/12/28/dcx-ppmnon-us1220-update-1/

28/12/2018 www.pdf-archive.com

g12 96%

Understanding the different types of attacks and methods that hackers are using to compromise systems is essential to understanding how organizations can secure their environment.

https://www.pdf-archive.com/2015/02/18/g12/

18/02/2015 www.pdf-archive.com

ADBMS Group Project-1 96%

For this we will store network details, secure IP addresses for last 10 logins and transactions, and providing a limit on transactions amount until the user requests for increasing the limit.

https://www.pdf-archive.com/2018/01/08/adbms-group-project-1/

08/01/2018 www.pdf-archive.com