Control system security

Results: 2384



#Item
661Crime prevention / Public safety / Security engineering / Warning systems / Closed-circuit television / Burglar alarm / Security / Safety / Access control

SPECIFICATIONS: SYSTEM V Web-Based System V ® Entry-Master System V is our premier security and card access system. The

Add to Reading List

Source URL: www.entry-master.com

Language: English - Date: 2014-11-28 13:25:12
662Identity management / Digital media / Internet / Operating system / Security / Access control / Computer security

MOBILeACCESS www.pssmobileaccess.com For Foot Traffic Control Product Overview PRODUCT SUMMARY ............................................................................................... 2

Add to Reading List

Source URL: www.pssmobilety.com

Language: English - Date: 2013-03-13 15:17:06
663Crime prevention / National security / Computer security / Unisys / Burroughs MCP / Computer-aided audit tools / Access control / Password / Unisys OS 2200 operating system / Security / Computer network security / Information technology audit

Locum Software Services Limited Security Solutions ALERT ASSURE

Add to Reading List

Source URL: www.locumsoftware.co.uk

Language: English - Date: 2015-02-18 04:57:12
664Unisys / Computer security / Access control / Su / Unisys OS 2200 operating system / Password strength / Security / Identity management / Password

Safe & Secure Feature Sheet Safe & Secure is Locum Software’s highly-regarded and well-established security software for Unisys ClearPath MCP hosts. It centralizes and simplifies security administration while offering,

Add to Reading List

Source URL: www.locumsoftware.co.uk

Language: English - Date: 2015-02-02 10:21:05
665Computing / Domain Name System Security Extensions / Name server / Transmission Control Protocol / Google Public DNS / Anycast / Root name server / DNS zone / DNS root zone / Domain name system / Internet / Network architecture

Connection-Oriented DNS to Improve Privacy and Security Liang Zhu∗ , Zi Hu∗ , John Heidemann∗ , Duane Wessels† , Allison Mankin† , Nikita Somaiya∗ ∗ USC/Information Sciences Institute

Add to Reading List

Source URL: www.isi.edu

Language: English - Date: 2015-03-14 02:32:34
666Federal Reserve System / Database / Access control / Health Insurance Portability and Accountability Act / Information security / Security / Computer security / Internet privacy

The Bureau of the Fiscal Service Privacy Impact Assessment The mission of the Bureau of the Fiscal Service (Fiscal Service) is to promote the financial integrity and operational efficiency of the federal government throu

Add to Reading List

Source URL: fiscal.treasury.gov

Language: English - Date: 2015-02-25 08:43:31
667Unix / RSBAC / Access control / File system / Kernel / Linux kernel / Filesystem Hierarchy Standard / Malware / Mandatory access control / System software / Software / Computing

3 How to Identify Security Requirements on a Server 3.1 System Base 3.2 Services 3.3 Users, User IDs and Paths 3.4 Logging

Add to Reading List

Source URL: www.rsbac.org

Language: English - Date: 2006-05-02 09:37:02
668Networking hardware / Videotelephony / Universal Mobile Telecommunications System / Mobile phone companies of India / Computer network security / General Packet Radio Service / Transmission Control Protocol / Network congestion / Large segment offload / Computing / Technology / Electronic engineering

2G/3G Network Measurements in Rural Areas of India Amitsingh Chandele Zahir Koradia

Add to Reading List

Source URL: www.cse.iitd.ernet.in

Language: English - Date: 2015-02-20 05:13:32
669Security / Information technology audit / Computer security / Network management / Syslog / Operating system / File system / Access control / Information technology audit process / Auditing / Information technology management / Computing

Secure4Audit A Technical White Paper NOTICE As Secure4Audit is a software product which is subject to change, S4Software, Inc. reserves the right to make changes in the specifications and other information contained

Add to Reading List

Source URL: www.s4software.com

Language: English - Date: 2008-01-14 04:28:23
670Computer network security / Nmap / Gordon Lyon / Transmission Control Protocol / Ping / Firewall / Stateful firewall / Idle scan / Cracking of wireless networks / Software / System software / Computing

Insecure.Org Nmap: Scanning the Internet by Fyodor Black Hat Briefings USA – August 6, 2008; 10AM

Add to Reading List

Source URL: nmap.org

Language: English - Date: 2013-04-12 14:15:31
UPDATE