Computer security

Results: 47159



#Item
941Digital ID final option appraisal

Digital ID final option appraisal

Add to Reading List

Source URL: blog.gov.je

Language: English - Date: 2016-07-07 06:54:47
942UNM UTILITIES DIVISION  POLICIES AND PROCEDURES EM 01 Initiated

UNM UTILITIES DIVISION POLICIES AND PROCEDURES EM 01 Initiated

Add to Reading List

Source URL: ppd.unm.edu

Language: English - Date: 2016-07-18 12:19:08
943The Case for a General and Interaction-based Third-party Cookie Policy Istemi Ekin Akkus1, Nicholas Weaver2 1 Max

The Case for a General and Interaction-based Third-party Cookie Policy Istemi Ekin Akkus1, Nicholas Weaver2 1 Max

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-11 00:33:43
944

PDF Document

Add to Reading List

Source URL: efiling.supremecourt.lk

Language: English - Date: 2014-10-27 09:51:46
945Microsoft Word - Information Tec.doc

Microsoft Word - Information Tec.doc

Add to Reading List

Source URL: macomb-stclairworks.org

Language: English - Date: 2009-02-12 10:26:12
946A Brief Look at Cybersecurity May 14, 2015 Nate Gravel CISA, CISM, CRISC Director – Information Security Practice W. Jackson Schultz Security Consultant – Information Security Practice

A Brief Look at Cybersecurity May 14, 2015 Nate Gravel CISA, CISM, CRISC Director – Information Security Practice W. Jackson Schultz Security Consultant – Information Security Practice

Add to Reading List

Source URL: www.gravoc.com

Language: English - Date: 2015-05-20 14:24:44
947Proceedings of the International MultiConference of Engineers and Computer Scientists 2014 Vol II, IMECS 2014, March, 2014, Hong Kong Business Buddy: Connecting You and Your Business Partners Kenneth Kin Pong Kwo

Proceedings of the International MultiConference of Engineers and Computer Scientists 2014 Vol II, IMECS 2014, March, 2014, Hong Kong Business Buddy: Connecting You and Your Business Partners Kenneth Kin Pong Kwo

Add to Reading List

Source URL: www.bpti.lt

Language: English - Date: 2014-04-10 12:20:58
948Run-time Monitoring and Formal Analysis of Information Flows in Chromium Lujo Bauer Shaoying Cai? Limin Jia Timothy Passaro Michael Stroucken Carnegie Mellon University ? Institute for Infocomm Research

Run-time Monitoring and Formal Analysis of Information Flows in Chromium Lujo Bauer Shaoying Cai? Limin Jia Timothy Passaro Michael Stroucken Carnegie Mellon University ? Institute for Infocomm Research

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
949CyberGuard SG User Manual CyberGuard 7984 South Welby Park Drive #101 Salt Lake City, Utah 84084

CyberGuard SG User Manual CyberGuard 7984 South Welby Park Drive #101 Salt Lake City, Utah 84084

Add to Reading List

Source URL: go.mcafee.com

Language: English - Date: 2005-10-17 21:55:19
950Defense Trade Advisory Group (DTAG) Cyber Working Group White Paper October 29, 2015 DTAG Working Group Members Co-chairs: Rebecca Conover & Larry Fink

Defense Trade Advisory Group (DTAG) Cyber Working Group White Paper October 29, 2015 DTAG Working Group Members Co-chairs: Rebecca Conover & Larry Fink

Add to Reading List

Source URL: www.pmddtc.state.gov

Language: English - Date: 2016-03-02 15:03:40