Information Security Forum

Results: 244



#Item
31Cybersecurity through an Identity Management System Elli Androulaki, Maritza Johnson, Binh Vo, and Steven Bellovin Engaging Data Forum October 2009

Cybersecurity through an Identity Management System Elli Androulaki, Maritza Johnson, Binh Vo, and Steven Bellovin Engaging Data Forum October 2009

Add to Reading List

Source URL: senseable.mit.edu

Language: English - Date: 2009-10-27 15:39:07
32SAFECODE MEMBER CONFIDENTIALITY AND NON-DISCLOSURE AGREEMENT This Agreement is entered into among the following parties: Software Assurance Forum for Excellence in Code (―SAFECode‖) and each member of SAFECode that h

SAFECODE MEMBER CONFIDENTIALITY AND NON-DISCLOSURE AGREEMENT This Agreement is entered into among the following parties: Software Assurance Forum for Excellence in Code (―SAFECode‖) and each member of SAFECode that h

Add to Reading List

Source URL: safecode.org

Language: English - Date: 2014-08-15 16:06:42
33IWS –The Information Warfare Site Infocon Magazine Issue One, October 2003 http://www.iwar.org.uk/infocon/ Corporate Open Source Information Leakage A self-assessment approach using Internet sources

IWS –The Information Warfare Site Infocon Magazine Issue One, October 2003 http://www.iwar.org.uk/infocon/ Corporate Open Source Information Leakage A self-assessment approach using Internet sources

Add to Reading List

Source URL: www.iwar.org.uk

Language: English - Date: 2008-11-19 08:47:51
34

PDF Document

Add to Reading List

Source URL: www.freedomonlinecoalition.com

Language: English
35MADEFIRE, INC. TERMS OF USE 1) INTRODUCTION. These terms of use, as amended from time to time, are a legal agreement between Madefire, Inc., its affiliates and any of their respective successors or assigns (collectively,

MADEFIRE, INC. TERMS OF USE 1) INTRODUCTION. These terms of use, as amended from time to time, are a legal agreement between Madefire, Inc., its affiliates and any of their respective successors or assigns (collectively,

Add to Reading List

Source URL: www-s3.madefire.com

Language: English - Date: 2013-03-19 14:03:27
36newsletter_settembre_newsletter

newsletter_settembre_newsletter

Add to Reading List

Source URL: www.geo.uib.no

Language: English - Date: 2011-11-09 05:53:06
37Microsoft Word - Dynamic Security Perimeter - Solution Brief.docx

Microsoft Word - Dynamic Security Perimeter - Solution Brief.docx

Add to Reading List

Source URL: sdn-wan.cloudgenix.com

Language: English - Date: 2015-04-26 05:20:32
38Cybersecurity and Privacy Innovation Forum 2015 Brussels, 28 April 2015 Keynote address Giovanni Buttarelli European Data Protection Supervisor Ladies and gentlemen,

Cybersecurity and Privacy Innovation Forum 2015 Brussels, 28 April 2015 Keynote address Giovanni Buttarelli European Data Protection Supervisor Ladies and gentlemen,

Add to Reading List

Source URL: secure.edps.europa.eu

Language: English - Date: 2015-04-28 04:22:38
39The Internet Governance Forum (IGF) Inaugural Meeting Athens, 30 October – 2 NovemberBackground Report

The Internet Governance Forum (IGF) Inaugural Meeting Athens, 30 October – 2 NovemberBackground Report

Add to Reading List

Source URL: www.nonformality.org

Language: English - Date: 2011-05-30 04:19:22
40Code of Practice for Cloud Service Providers This Code of Practice for Cloud Service Providers (‘Code’) from the Cloud Industry Forum (‘CIF’) is for organizations offering to customers remotely hosted IT services

Code of Practice for Cloud Service Providers This Code of Practice for Cloud Service Providers (‘Code’) from the Cloud Industry Forum (‘CIF’) is for organizations offering to customers remotely hosted IT services

Add to Reading List

Source URL: www.cloudindustryforum.org

Language: English - Date: 2015-01-28 05:04:13