Computer security

Results: 47159



#Item
891Security / National security / Prevention / Crime prevention / Cryptography / Information governance / Law enforcement / Norbert Pohlmann / Computer security / Paradigm

How to come out of the increasing IT security problems Norbert Pohlmann Chairman: IT security association TeleTrusT Professor: Westphalian University of Applied Sciences

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-12-15 12:33:54
892Security / Computer network security / Cyberwarfare / Crime prevention / Cryptography / Information governance / National security / Information technology controls / SarbanesOxley Act / Internal control / Computer security / Regulatory compliance

SECURITY COMPLIANCE MANAGEMENT COMPLY WITH SARBANES-OXLEY IT SECURITY CONTROLS The Challenge Section 404 of the Sarbanes-Oxley Act (SOX) requires that chief executives attest to the

Add to Reading List

Source URL: www.nsaservices.com

Language: English - Date: 2013-03-28 15:31:27
893Cryptography / Microsoft Windows / Computing / Computer network security / Authentication protocols / Kerberos / BitLocker / Password / Email

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
894Hypertext Transfer Protocol / Internet privacy / Computer access control / HTTP cookie / Computing / Session / Hypertext / Computer security

Exceliance - ALOHA Load-Balancer Memo HAProxy cookie persistence methods

Add to Reading List

Source URL: www.haproxy.com

Language: English - Date: 2014-04-28 06:41:28
895Software / Computer security / System software / Antivirus software / Malwarebytes Anti-Malware / Malware / Rootkit / Computer virus / Avira / Ransomware / Spyware

C A S E S T U DY Gallup-McKinley County Schools successfully defends against ransomware Malwarebytes is a critical part of maintaining a safe learning environment Business profile

Add to Reading List

Source URL: ru.malwarebytes.com

Language: English - Date: 2016-07-06 12:46:25
896Technology / Electronics / Computer recycling / Data security / Electronic waste / Television / Joint Electronics Type Designation System / Communication

How much e-waste is collected in states with recycling laws

Add to Reading List

Source URL: www.electronicstakeback.com

Language: English - Date: 2016-02-11 15:32:41
897Identity management / Law / Privacy / Cryptography / Computer security / Digital media

Sensitive Information in a Wired World Supported by the National Science Foundation under the ITR Program JOAN FEIGENBAUM

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2003-12-06 08:26:04
898Computing / Software / Computer security / Hacking / Computer network security / Software architecture / OWASP / ASP.NET / Application security / Cross-site scripting / Vulnerability / Web application

Microsoft PowerPoint - DenimGroup_IntroductionToApplicationSecurityInDotNETEnvironments.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:05
899Internet privacy / Computing / Computer security / Cyberspace / HTTP cookie / Privacy policy / Privacy / Personally identifiable information / P3P / Privacy concerns with social networking services

    ARUBA AIRLINES WEBSITE PRIVACY POLICY   PRIVACY POLICY - ARUBAAIRLINES.COM

Add to Reading List

Source URL: arubaairlines.com

Language: English - Date: 2015-11-12 11:59:44
900Computing / Project management / Security / Technology / PRINCE2 / Internet of things / Big data / Systems Modeling Language / Computer security / Object Process Methodology

Job offer itrust consulting s.à r.l. N. réf : ANN_H012_CRYPTOGRAPHER_V1.1.DOC

Add to Reading List

Source URL: www.itrust.lu

Language: English - Date: 2016-04-04 10:33:38
UPDATE