Defensive computing

Results: 75



#Item
31The Red Team penetration test for the InkaVote Plus was conducted by

The Red Team penetration test for the InkaVote Plus was conducted by

Add to Reading List

Source URL: votingsystems.cdn.sos.ca.gov

Language: English - Date: 2014-12-02 18:09:34
32Microsoft Word[removed]template.docx

Microsoft Word[removed]template.docx

Add to Reading List

Source URL: www.nd.gov

Language: English - Date: 2014-05-30 15:42:48
33Microsoft Word - StudentInternetUseAgreement EN_1

Microsoft Word - StudentInternetUseAgreement EN_1

Add to Reading List

Source URL: m.pickenstech.org

Language: English - Date: 2013-08-05 18:58:29
34UNCLASSIFIED  NCCIC ADVISORY National Cybersecurity & Communications Integration Center  2 MAY 2011 – 1400: OSAMA BIN LADEN – THEMED PHISHING

UNCLASSIFIED NCCIC ADVISORY National Cybersecurity & Communications Integration Center 2 MAY 2011 – 1400: OSAMA BIN LADEN – THEMED PHISHING

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-10-07 21:38:32
35EXTENSIBLE PROVISIONING PROTOCOL MAPPING: <DEFENSIVE REGISTRATION> Version 1.2

EXTENSIBLE PROVISIONING PROTOCOL MAPPING: Version 1.2

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2012-07-12 13:40:02
366086 in process[removed]docx

6086 in process[removed]docx

Add to Reading List

Source URL: www.nhcs.net

Language: English - Date: 2013-09-09 16:46:44
37PERSONNEL, NEBRASKA STATE COLLEGES POLICY: 5008 Employee Use of Campus Computers Page 1 of 4 ______________________________________________________________________________

PERSONNEL, NEBRASKA STATE COLLEGES POLICY: 5008 Employee Use of Campus Computers Page 1 of 4 ______________________________________________________________________________

Add to Reading List

Source URL: www.csc.edu

Language: English - Date: 2008-10-07 16:18:23
38IT Use Guideline - Computer and Network Use General Guidelines

IT Use Guideline - Computer and Network Use General Guidelines

Add to Reading List

Source URL: oit.ua.edu

Language: English - Date: 2014-08-19 12:15:22
39Protecting the Homeland Report of the Defense Science Board Task Force on DEFENSIVE INFORMATION OPERATIONS 2000 Summer Study

Protecting the Homeland Report of the Defense Science Board Task Force on DEFENSIVE INFORMATION OPERATIONS 2000 Summer Study

Add to Reading List

Source URL: www.au.af.mil

Language: English - Date: 2012-01-04 10:15:03
40May 2014 Volume 9, Issue 5 Protecting Against Mobile Malware Department of Accounting and General Services (DAGS)

May 2014 Volume 9, Issue 5 Protecting Against Mobile Malware Department of Accounting and General Services (DAGS)

Add to Reading List

Source URL: ags.hawaii.gov

Language: English - Date: 2014-05-29 16:09:38