Digital security

Results: 4317



#Item
741Actuarial science / Ethics / Security / Foreign and Commonwealth Office / Records management / Risk management / Risk / Digital continuity / Knowledge management / Management / Business / Information technology management

PDF Document

Add to Reading List

Source URL: www.nationalarchives.gov.uk

Language: English - Date: 2015-02-17 13:02:13
742Content-control software / Information society / Internet censorship / Privacy / Censorship / International Institute of Social Studies / Internet / Freedom House / MATIS Group / Technology / Digital media / Computer network security

Society for International Development – Netherlands Chapter (SIDNL) presents In the Series ‘New Spaces for International Engagement’: ‘Internet, the Last Bastion of Unlimited Freedom?’ Tuesday 17 March 2015 San

Add to Reading List

Source URL: sidnl.org

Language: English - Date: 2015-02-25 06:10:14
743Finance / Economics / Digital media / Crimes / Identity theft / Theft / Fair and Accurate Credit Transactions Act / Credit freeze / Credit history / Credit / Taxation in the United States / Personal finance

Social Security number theft Steps to Take Immediately - Follow each step below to help recover from the damage caused by identity theft. Step 1: If you have received a notice from the Department of Workforce Services or

Add to Reading List

Source URL: idtheft.utah.gov

Language: English - Date: 2015-03-16 16:50:07
744Linux / Cross-platform software / Open-source software / Open source / Operating system / EnGarde Secure Linux / Security-focused operating system / Software / Computing / System software

COMPANY BACKGROUNDER Overview Guardian Digital, the premier open source security company, offers the first secure, open source Internet infrastructure system. Based on Guardian Digital’s operating system platform, EnGa

Add to Reading List

Source URL: www.guardiandigital.com

Language: English - Date: 2008-05-27 12:28:00
745Internet protocols / Internet standards / Cryptographic protocols / Key derivation function / PBKDF2 / Online Certificate Status Protocol / Digital signature / Password / Steganography / Cryptography / Key management / Public-key cryptography

Security  Highlights   The  IBM  Mobile  Iden7ty  framework  has  embraced  several  industry  standards  to  allow  applica7on   developers  to  create  secure  s

Add to Reading List

Source URL: www-01.ibm.com

Language: English - Date: 2014-11-20 11:27:30
746New media / Media technology / Videotelephony / Crime prevention / Information security / National security / Mobile phone / Telecommunication / National Telecommunications and Information Administration / Technology / Digital media / Electronics

3 been reported. In order to conduct effective detection of unlicensed radio stations, the government has been developing the Detect Unlicensed Radio Stations (DEURASÅFDetect Unlicensed Radio Stations) since 1993.

Add to Reading List

Source URL: www.soumu.go.jp

Language: English - Date: 2009-10-02 11:39:13
747Electronic commerce / Payment systems / Mobile banking / Mobile content / Security token / Multi-factor authentication / Authentication / SMS / ReD / Technology / Mobile technology / Security

FEEDZAI AND ENCAP SECURITY ANNOUNCE STRATEGIC PARTNERSHIP Intelligent Fraud Protection and Smarter Authentication Combine to Make Digital Commerce and Banking Safe San Mateo, Calif. – October 27, 2014 –Feedzai, a com

Add to Reading List

Source URL: www.feedzai.com

Language: English - Date: 2014-10-27 13:22:03
748Iridium Communications / Computing / Broadband Global Area Network / Computer security / IronKey / Internet / Cloud computing / Data security / Technology / Digital media / Computer network security

As a proud sponsor of the SAMI Citadel Symposium we enclose a brief overview of the various systems we showcased at the event. Firstly, the Gryphon Counter Piracy system. We have two versions of these available – stand

Add to Reading List

Source URL: www.seasecurity.org

Language: English - Date: 2012-09-13 05:34:32
749National security / Cyberwarfare / Electronic warfare / Hacking / Military technology / Computer security / RSA / Computer crimes / Security / Crime

“In this rapidly changing digital world it is crucial to be innovative. Being three months ahead is considered far, we try to stay two years ahead of any problem.” SID NL and Humanity House BREAD & BRAINS with Ida Ha

Add to Reading List

Source URL: sidnl.org

Language: English - Date: 2015-01-26 05:24:19
750Network architecture / Addendum / BATS Global Markets / Personal digital assistant / Bats / Computing / Technology / Electronics / Mobile computers / Computer network security / Extranet

Extranet Addendum to the BATS Global Markets, Inc. Connectivity Services Agreement This Addendum (this “Addendum”), with an effective date as of the date executed on the signature page hereof, is made by and between

Add to Reading List

Source URL: cdn.batstrading.com

Language: English - Date: 2015-04-15 13:02:35
UPDATE