Computer security

Results: 47159



#Item
701Computing / Computer security / Computer network security / E-commerce / Cyberwarfare / Information privacy / Payment Card Industry Data Security Standard / Cogeco / Web application firewall / Application firewall / Peer 1 / Denial-of-service attack

COGECO_Peer_1_Logo_v2_WHITE

Add to Reading List

Source URL: www.cogecopeer1.com

Language: English - Date: 2016-07-20 15:41:15
702Wireless sensor network / Wireless networking / Computing / Wireless / Technology / Sensor node / Wireless ad hoc network / Linear network coding / ANT / Computer security / Peer-to-peer / Draft:Energy related security attacks

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-12 08:33:06
703Microsoft / Computer access control / Computer security / Webmail / Password / Security / Login / Outlook.com / Internet privacy / Self-service password reset / Password fatigue

Microsoft Word - MML Getting Started FDOC

Add to Reading List

Source URL: userwww.sfsu.edu

Language: English - Date: 2011-08-24 16:02:12
704Cyberwarfare / Security / Malware / Computer security / Computer virus / Denial-of-service attack

Microsoft Word - idp-gmesdoc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-02-02 08:44:25
705Auditing / Prevention / Economy / Business / Security / Actuarial science / Computer security / Data security / Risk management / Internal control / Information security / Ramboll Environ

AffinityRisk & Compliance Report_v2.indd

Add to Reading List

Source URL: stakeholder.affinitywater.co.uk

Language: English - Date: 2015-07-27 10:00:31
706Unix / Computing / Software / System software / Digital media / Research / System administration / USENIX / Cyber-physical system / Electronic submission / Computer security

Announcement and Call for Papers 4th Workshop on Cyber Security Experimentation and Test (CSET ’11) Sponsored by USENIX, the Advanced Computing Systems Association http://www.usenix.org/cset11

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-04-25 15:59:03
707Security / Prevention / Crime prevention / Cryptography / Information governance / National security / Computer security / Password / Authorization

University Of Pennsylvania PennERS Access Request Form PART 1 IDENTIFICATION INFORMATION (To be completed by requestor) Check one: New Change Add Suspend Delete Name: ___________________________________________

Add to Reading List

Source URL: www.finance.upenn.edu

Language: English - Date: 2006-03-14 20:50:33
708Computer keyboards / Electronic engineering / Fire alarm control panel / Keypad / Computing / Engineering

NAPCO SECURITY TECHNOLOGIES, INC. 333 Bayview Avenue, Amityville, New York, U.S.A9400 FAXNew GEMC Features and Accessories Supported by Version 83A6 (V83A6) & Quickloader V6

Add to Reading List

Source URL: www.napcosecurity.com

Language: English - Date: 2014-01-16 14:18:17
709Cyberwarfare / Computing / Security / Hacking / Computer network security / Malware / Server / Computer security / CSC Version 6.0 / Cyber-collection

THE PROJECTSAURON APT Global Research and Analysis Team VersionAugust 9, 2016) The ProjectSauron APT

Add to Reading List

Source URL: cdn.securelist.com

Language: English - Date: 2016-08-09 10:39:42
710Unix / System administration / USENIX / Computing / Computer science

20 USENIX SECURITY SYMPOSIUM th San Francisco, CA • August 8–12, 2011 Join us for a 5-day tutorial and refereed technical program for researchers, practitioners,

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-07-14 18:10:46
UPDATE