Computer security

Results: 47159



#Item
931Trees in the List: Accelerating List-based Packet Classification Through Controlled Rule Set Expansion Sven Hager Stefan Selent

Trees in the List: Accelerating List-based Packet Classification Through Controlled Rule Set Expansion Sven Hager Stefan Selent

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:55:48
932DIGITAL  DATA SECURITY COMMUNICATION

DIGITAL DATA SECURITY COMMUNICATION

Add to Reading List

Source URL: www.divsi.de

Language: English - Date: 2013-08-26 10:24:25
933e-Signatures & e-Seals – Opportunities and Challenges demystifying and preparing for the age of eIDAS Brussels Febkindly hosted by  EEMA – Limited Distribution Only

e-Signatures & e-Seals – Opportunities and Challenges demystifying and preparing for the age of eIDAS Brussels Febkindly hosted by EEMA – Limited Distribution Only

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:09
934The Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Camera-Ready Submission guidelines to ASSYST Submission Instructions to ASSYST – ICST Paper Submission and Review System 1. Reg

The Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Camera-Ready Submission guidelines to ASSYST Submission Instructions to ASSYST – ICST Paper Submission and Review System 1. Reg

Add to Reading List

Source URL: electronic-health.org

Language: English - Date: 2010-09-27 05:44:17
935Fischer Identity™  Turn Identity Management into a Strategic Advantage Password Reset & Synchronization

Fischer Identity™ Turn Identity Management into a Strategic Advantage Password Reset & Synchronization

Add to Reading List

Source URL: www.fischerinternational.com

Language: English - Date: 2016-06-03 10:12:26
936PCI Compliance Getting Started Guide Qualys PCI provides businesses, merchants and online service providers with the easiest, most cost effective and highly automated way to achieve compliance with the Payment Card Indus

PCI Compliance Getting Started Guide Qualys PCI provides businesses, merchants and online service providers with the easiest, most cost effective and highly automated way to achieve compliance with the Payment Card Indus

Add to Reading List

Source URL: www.qualys.com

Language: English - Date: 2016-03-18 15:34:30
937IHE Work Item Proposal (Detailed) 1. Proposed Work Item: Patient Privacy Policy Query Proposal Editor: IHE Suisse Tony Schaller (Technical Project Manager)

IHE Work Item Proposal (Detailed) 1. Proposed Work Item: Patient Privacy Policy Query Proposal Editor: IHE Suisse Tony Schaller (Technical Project Manager)

Add to Reading List

Source URL: www.ihe-suisse.ch

Language: English - Date: 2016-05-17 20:50:28
938Directions To Open Encrypted E-Mails From The State Of Utah  When you open an encrypted e-mail from the State of Utah you will see the following message: Depending on which e-mail program you use, you may also see the f

Directions To Open Encrypted E-Mails From The State Of Utah When you open an encrypted e-mail from the State of Utah you will see the following message: Depending on which e-mail program you use, you may also see the f

Add to Reading List

Source URL: laborcommission.utah.gov

Language: English - Date: 2015-09-15 11:55:14
939IT ACCEPTABLE USE STANDARDS PURPOSE A standard includes specific low level mandatory controls that help enforce and support a policy. The purpose of this document is to support and outline in detail

IT ACCEPTABLE USE STANDARDS PURPOSE A standard includes specific low level mandatory controls that help enforce and support a policy. The purpose of this document is to support and outline in detail

Add to Reading List

Source URL: bufa.ca

Language: English - Date: 2016-07-11 09:00:51
940Identity and Access Management for Smart Home Devices

Identity and Access Management for Smart Home Devices

Add to Reading List

Source URL: nccoe.nist.gov

Language: English - Date: 2016-06-03 07:49:14