Computer security

Results: 47159



#Item
811ECIAAA  ClientTracker SECTION 300

ECIAAA ClientTracker SECTION 300

Add to Reading List

Source URL: www.eciaaa.org

Language: English - Date: 2015-08-31 15:18:33
812ITS-related transport concepts and organisations’ preferences for office locations

ITS-related transport concepts and organisations’ preferences for office locations

Add to Reading List

Source URL: www.tbm.tudelft.nl

Language: English - Date: 2015-12-12 11:54:15
813Using Signal Detection Theory to Measure Phishing Detection Ability and Behavior Casey Canfield Baruch Fischhoff

Using Signal Detection Theory to Measure Phishing Detection Ability and Behavior Casey Canfield Baruch Fischhoff

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-03 02:38:28
814Microsoft Word - DelBimbo.doc

Microsoft Word - DelBimbo.doc

Add to Reading List

Source URL: svg.dmi.unict.it

Language: English - Date: 2012-04-22 14:09:28
815A Secure Civil GNSS: Satellite signal authentication and location & time verification using hidden signatures David De Lorenzo, Sherman Lo, Per Enge October 21, 2009

A Secure Civil GNSS: Satellite signal authentication and location & time verification using hidden signatures David De Lorenzo, Sherman Lo, Per Enge October 21, 2009

Add to Reading List

Source URL: scpnt.stanford.edu

Language: English - Date: 2009-10-27 13:42:56
816Third Party Authorisation Form At Santander Consumer Finance we take great care to ensure your personal details remain safe. In order to safeguard your data and fulfil our obligations under the Data Protection Act we wil

Third Party Authorisation Form At Santander Consumer Finance we take great care to ensure your personal details remain safe. In order to safeguard your data and fulfil our obligations under the Data Protection Act we wil

Add to Reading List

Source URL: www.santanderconsumer.co.uk

Language: English - Date: 2016-05-23 05:39:29
817C A S E S T U DY  When it comes to malware defense, Gilbane Building Company nails it Gilbane crushes malware and exploits on its endpoints with Malwarebytes Endpoint Security

C A S E S T U DY When it comes to malware defense, Gilbane Building Company nails it Gilbane crushes malware and exploits on its endpoints with Malwarebytes Endpoint Security

Add to Reading List

Source URL: ru.malwarebytes.com

Language: English - Date: 2016-07-07 18:42:41
818Technology / Computing / Media technology / Digital media / Geert Lovink / XS4ALL / Internet / E-democracy / Bulletin board system / Computer network / Security hacker / DirectDraw Surface

The Rise and Fall of DDS evaluating the ambitions of AmsterdamÕs Digital City

Add to Reading List

Source URL: reinder.rustema.nl

Language: English - Date: 2011-04-20 17:16:48
819Deliverable DNA2.1: Report on the identification of target groups and their requirements

Deliverable DNA2.1: Report on the identification of target groups and their requirements

Add to Reading List

Source URL: aarc-project.eu

Language: English - Date: 2016-07-21 05:59:16
820COMPANY HISTORY In 1998, CEO Brad Caldwell recognized the need for affordable data security for the masses after his former company’s website was hacked. At the time, the only organization qualified to help his busine

COMPANY HISTORY In 1998, CEO Brad Caldwell recognized the need for affordable data security for the masses after his former company’s website was hacked. At the time, the only organization qualified to help his busine

Add to Reading List

Source URL: www.securitymetrics.com

Language: English - Date: 2016-08-17 15:46:07