Defensive computing

Results: 75



#Item
61Antivirus software / Computing / Backup / Spyware / Email / Phishing / Computer virus / Adware / Defensive computing / Internet / Espionage / Malware

PDF Document

Add to Reading List

Source URL: umanitoba.ca

Language: English - Date: 2014-07-04 15:33:41
62Embedded Linux / Malware / Antivirus software / IOS jailbreaking / Android / Rooting / Opera / Defensive computing / Mobile business intelligence / Software / Computing / Smartphones

May 2014 Volume 9, Issue 5 Protecting Against Mobile Malware NH Department of Information Technology www.nh.gov/doit/cybersecurity

Add to Reading List

Source URL: www.nh.gov

Language: English - Date: 2014-05-29 09:37:02
63World Wide Web / Computing / Web design / 37signals / Web usability / User interface design / Ruby on Rails / Design / Usability / Web 2.0

Book review: Defensive Design for the Web1 by Branko Collin (May 12, 2004) Introduction Defensive Design for the Web deals with

Add to Reading List

Source URL: abeleto.nl

Language: English - Date: 2012-07-13 12:18:58
64Internet / Password / Internet privacy / Internet forum / Operating system / Email client / Defensive computing / Email / Computer-mediated communication / Computing

Coahoma Independent School District Guidelines for Acceptable Use of Technology Resources for Students The Coahoma Independent School District provides technology resources to its students and staff for educational and a

Add to Reading List

Source URL: www.coahomaisd.com

Language: English - Date: 2014-01-22 12:24:08
65Espionage / Internet / Computer security / Computing / Defensive computing / Spyware / Internet privacy / Computer network / Computer crime

Student Guidelines for Acceptable Use of Technology Resources These guidelines are provided so that students and parents are aware of the responsibilities students accept when they use District-owned computer hardware, o

Add to Reading List

Source URL: www.colmesneilisd.net

Language: English - Date: 2013-12-04 12:51:46
66Digital media / Computer security / Acceptable use policy / Etiquette / Internet culture / Internet privacy / Computer network / Password / Defensive computing / Email / Computing / Internet

ATTACHMENT A Los Angeles Unified School District Acceptable Use Policy (AUP) for District Computer Systems

Add to Reading List

Source URL: www.lausd.k12.ca.us

Language: English - Date: 2006-06-05 18:44:38
67World Wide Web / Computing / Web design / 37signals / Web usability / User interface design / Ruby on Rails / Design / Usability / Web 2.0

Book review: Defensive Design for the Web1 by Branko Collin (May 12, 2004) Introduction Defensive Design for the Web deals with

Add to Reading List

Source URL: www.abeleto.nl

Language: English - Date: 2012-07-13 12:18:58
68Social engineering / Malware / Phishing / Keystroke logging / Email spam / Defensive computing / Web threat / Cybercrime / Computer crimes / Spamming

Microsoft Word[removed]ROK Security Alert - New email scam.doc

Add to Reading List

Source URL: www.therock.com.au

Language: English - Date: 2014-04-04 01:02:47
69IRC / Shooting sport / The Organ / Handgun / Computing / Internet / Technology / Revolver / Internet Relay Chat / International Defensive Pistol Association

January-March[removed]The CT is going

Add to Reading List

Source URL: www.icore.org

Language: English - Date: 2011-08-01 01:16:56
70Computer network security / Software testing / Buffer overflow / Uncontrolled format string / Vulnerability / Cisco IOS / Secure coding / JavaScript / Defensive programming / Computing / Cyberwarfare / Computer security

PDF Document

Add to Reading List

Source URL: developer.apple.com

Language: English
UPDATE