Digital self-defense

Results: 31



#Item
11Ribbon symbolism / Breast cancer / Mammography / Projectional radiography / Infrared imaging / Breast self-examination / Digital mammography / Digital infrared thermal imaging in health care / Breast cancer screening / Medicine / Oncology / Cancer screening

MAMMOGRAMS What to Expect The best defense against breast cancer is early detection. Screening

Add to Reading List

Source URL: www.uahealth.com

Language: English - Date: 2014-11-21 12:48:42
12Security / Internet / Web applications / Password notification email / Digital self-defense / Password / Computing / Email

Microsoft Word - ISdeptsetupform

Add to Reading List

Source URL: cityofsitka.com

Language: English - Date: 2014-10-28 19:45:33
13Data security / Computer crimes / Spamming / Password / Internet / Information security / Phishing / Email / Digital self-defense / Security / Computing / Computer security

Best Practices For Office Information Security 1. Be suspicious of email links and attachments. Emails designed to trick you into clicking links and downloading files come to inboxes daily. It is a practice called phishi

Add to Reading List

Source URL: nova2011.imarcsgroup.com

Language: English - Date: 2014-10-10 13:36:38
14Internet / Password / Federated identity / Web 2.0 / Digital self-defense / Apple ID / Email / Spamming / Computing

Microsoft Word - Creating an Account REVISED 2011nov.docx

Add to Reading List

Source URL: www.stthomas.edu

Language: English - Date: 2014-11-19 22:32:40
15Phishing / Passphrase / Malware / Internet privacy / Opera / Password manager / Digital self-defense / Software / Cryptography / Password

Pomona College ITSMonthly—The Security Edition AUGUST, 2014 AN OPTIMISTIC FORAY INTO THE WORLD OF COMMUNICATION

Add to Reading List

Source URL: its.pomona.edu

Language: English - Date: 2014-07-31 10:32:05
16Internet / Password / Proxy server / Network architecture / Internet protocols / Computer security / Password strength / Digital self-defense / Internet privacy / Computing / Computer networking

Proxy servers This document is intended to guide librarians in the security of user names and passwords issued by their proxy server, when used to access online research literature. Publisher licenses All institutions re

Add to Reading List

Source URL: www.inasp.info

Language: English - Date: 2014-06-06 10:30:45
17Internet privacy / Malware / Privacy / Social networking service / Digital self-defense / Password manager / Ethics / Identity management / Password

While interacting on a social network site … Protect your Personal Information (PI) Accessing social networking sites Using Your Computer Share the minimum amount of Personal Information (P I) : never share passwords

Add to Reading List

Source URL: www.rbc.com

Language: English - Date: 2013-10-03 09:30:48
18Internet / Computer security / Spamming / Digital self-defense / Password / Email / Computing

Microsoft Word - ISdeptsetupform

Add to Reading List

Source URL: www.cityofsitka.com

Language: English - Date: 2013-02-20 19:41:29
19Identity management / Social issues / Email / Internet privacy / Password / Privacy / HTTP cookie / Digital self-defense / Ethics / Internet / Computing

Microsoft Word - NNEDV_OnlinePrivacyandSafetyTips_3-2010_cf.doc

Add to Reading List

Source URL: endabusewi.org

Language: English - Date: 2011-06-08 12:30:32
20Digital media / Password / Internet privacy / Identity theft / Digital self-defense / Password fatigue / Email / Computing / Internet

Embassy of the United States of America American Citizen Services 24 Grosvenor Square London, W1A 2LQ PROTECTING YOUR PERSONAL INFORMATION

Add to Reading List

Source URL: photos.state.gov

Language: English - Date: 2010-06-15 09:33:46
UPDATE