Defensive computing

Results: 75



#Item
41South College Computing Code of Ethics

South College Computing Code of Ethics

Add to Reading List

Source URL: www.southcollegetn.edu

Language: English - Date: 2014-08-01 12:14:30
42UNCLASSIFIED  NCCIC ADVISORY National Cybersecurity & Communications Integration Center  2 MAY 2011 – 1400: OSAMA BIN LADEN – THEMED PHISHING

UNCLASSIFIED NCCIC ADVISORY National Cybersecurity & Communications Integration Center 2 MAY 2011 – 1400: OSAMA BIN LADEN – THEMED PHISHING

Add to Reading List

Source URL: www.pld.com

Language: English - Date: 2013-09-20 15:05:07
43Fight-Against-Malware _3_

Fight-Against-Malware _3_

Add to Reading List

Source URL: www.its.ms.gov

Language: English - Date: 2014-09-19 10:01:21
44Collegiate Computer User Code of Ethics[removed]The purpose of the Code of Ethics is to promote responsible, ethical and secure use of the computing facilities provided by the University of Winnipeg and the Collegia

Collegiate Computer User Code of Ethics[removed]The purpose of the Code of Ethics is to promote responsible, ethical and secure use of the computing facilities provided by the University of Winnipeg and the Collegia

Add to Reading List

Source URL: collegiate.uwinnipeg.ca

Language: English - Date: 2012-02-15 14:18:16
45Malware / Smartphone / IOS jailbreaking / Phishing / Near field communication / Opera / Internet security / Defensive computing / Mobile virus / Software / Computing / Antivirus software

From the Desk of [Insert Name Here] Is Malware a Threat to Mobile Devices? The volume of cyber threats to mobile computing devices continues to increase as new applications and devices proliferate. McAfee reports there

Add to Reading List

Source URL: www.dhses.ny.gov

Language: English - Date: 2014-07-08 09:23:54
46STANDARD ADMINISTRATIVE PROCEDURE[removed]M1.23 Information Resources – Malicious Code Approved July 18, 2005 Revised February 24, 2009

STANDARD ADMINISTRATIVE PROCEDURE[removed]M1.23 Information Resources – Malicious Code Approved July 18, 2005 Revised February 24, 2009

Add to Reading List

Source URL: rules-saps.tamu.edu

Language: English - Date: 2014-03-04 12:38:17
47May 2014 Volume 9, Issue 5 Protecting Against Mobile Malware Enterprise Security and Risk Management Office Monthly Security Tips

May 2014 Volume 9, Issue 5 Protecting Against Mobile Malware Enterprise Security and Risk Management Office Monthly Security Tips

Add to Reading List

Source URL: www.esrmo.scio.nc.gov

Language: English - Date: 2014-06-02 11:43:47
48Microsoft Word - StudentInternetUseAgreement EN_1

Microsoft Word - StudentInternetUseAgreement EN_1

Add to Reading List

Source URL: www.pickenstech.org

Language: English - Date: 2013-08-05 18:58:29
49University of Manitoba Research Suggested Practices for IT Written by Trevor Mazak September 10, 2013 Last Revised September 16, 2013 Notice: The contents of this document are highly time sensitive. Best practices today

University of Manitoba Research Suggested Practices for IT Written by Trevor Mazak September 10, 2013 Last Revised September 16, 2013 Notice: The contents of this document are highly time sensitive. Best practices today

Add to Reading List

Source URL: www.umanitoba.ca

Language: English - Date: 2014-09-04 10:16:43
50National Safety Council / Form / Computing / Software / Defensive driving / Risk management / Password

USDA Forest Service – R1 Employees LOGIN INSTRUCTIONS TO ACCESS NATIONAL SAFETY COUNCIL’S DEFENSIVE DRIVING COURSE

Add to Reading List

Source URL: gacc.nifc.gov

Language: English - Date: 2014-07-12 14:25:54