Security

Results: 374843



#Item
301

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to the DEPARTMENT OF HOMELAND SECURITY Privacy Act of 1974; Implementation of Exemptions; Department of Homeland Security/ALL-030 Use of the Terrorist Screening Datab

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2016-02-23 10:22:42
    302

    Data Security Policy - Boston College

    Add to Reading List

    Source URL: www.bc.edu

    Language: English - Date: 2017-07-05 08:23:07
      303

      IMPLEMENTATION ROADMAP FOR THE NATIONAL CRITICAL INFRASTRUCTURE SECURITY AND RESILIENCE RESEARCH AND DEVELOPMENT PLAN PRODUCT OF THE

      Add to Reading List

      Source URL: obamawhitehouse.archives.gov

      Language: English - Date: 2016-12-20 12:36:48
        304

        2013 IEEE Symposium on Security and Privacy Practical Control Flow Integrity & Randomization for Binary Executables Chao Zhang1 , Tao Wei1,2∗ , Zhaofeng Chen1 , Lei Duan1 , L´aszl´o Szekeres2,3+ , Stephen McCamant2,

        Add to Reading List

        Source URL: seclab.cs.sunysb.edu

        Language: English - Date: 2016-02-03 15:00:11
          305

          X-Force: Force-Executing Binary Programs for Security Applications Fei Peng, Zhui Deng, Xiangyu Zhang, and Dongyan Xu, Purdue University; Zhiqiang Lin, The University of Texas at Dallas; Zhendong Su, University of Califo

          Add to Reading List

          Source URL: web.cse.ohio-state.edu

          Language: English - Date: 2018-01-07 13:07:05
            306

            HIPAA COMPLIANCE GUIDE HIPAA Compliance The Health Insurance Portability and Accountability Act (HIPAA) lays out privacy and security standards that protect the confidentiality of patient health information. In terms of

            Add to Reading List

            Source URL: zoom.us

            Language: English - Date: 2018-06-17 09:17:43
              307

              MONDAY - DATE: _________________________________ Have you signed in to the fish room security log? PLEASE DO SO! ROOM #: Biology 228

              Add to Reading List

              Source URL: rlearley.people.ua.edu

              Language: English - Date: 2016-08-23 15:32:24
                308

                Security Matters: Privacy in Voting and Fairness in Digital Exchange PROEFSCHRIFT

                Add to Reading List

                Source URL: satoss.uni.lu

                Language: English - Date: 2014-09-17 09:24:07
                  309

                  A Clairvoyant Approach to Evaluating Software (In)Security Bhushan Jain Chia-Che Tsai Donald E. Porter

                  Add to Reading List

                  Source URL: www.chiachetsai.com

                  Language: English - Date: 2018-04-07 01:30:50
                    310

                    Exploiting type systems and static analyses for smart card security Xavier Leroy INRIA Rocquencourt &

                    Add to Reading List

                    Source URL: xavierleroy.org

                    Language: English - Date: 2018-08-01 14:49:25
                      UPDATE