Logical security

Results: 112



#Item
61Computing / Telephony / Internet access / Computer network security / Logical Link Control / Dialer / War dialing / Firewall / Computer network / Internet / Electronic engineering / Modems

A Common Weak-Link in the Security Chain Gregory B. White, Ph.D. SecureLogix Corporation [removed] Keywords: Dial-up connections, Modems, Network Security, Intrusions/Penetrations Abstract

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
62National security / Identity management / FIPS 201 / Standards / Crime prevention / Credential / E-Authentication / Access control / Logical access control / Security / Computer security / Public safety

Memorandum for Chief Information Officers

Add to Reading List

Source URL: www.whitehouse.gov

Language: English - Date: 2012-12-05 14:19:40
63Science / Multi-agent system / Matrix / State space / Control theory / Cybernetics / Systems theory

Safety and Security in Networked Robotic Systems via Logical Consensus Simone Martini1 , Adriano Fagiolini1 , Gianluca Dini2 , and Antonio Bicchi1 1 Interdepartmental Research Center “E. Piaggio”,

Add to Reading List

Source URL: www.phriends.eu

Language: English - Date: 2009-10-20 22:03:37
64Computer security / Password / Acceptable use policy / Internet privacy / User / Logical security / Password manager / Computing / System administration / Cyberwarfare

Hyde School Computer Systems Acceptable Use Policy

Add to Reading List

Source URL: www.hyde.edu

Language: English - Date: 2013-10-21 14:32:20
65Digital rights management / Logical syntax / Metalogic / Mathematical logic / ODRL / Rights Expression Language / XrML / First-order logic / Well-formed formula / Logic / Metadata / Data

A Policy Language for Distributed Usage Control M. Hilty1 , A. Pretschner1 , D. Basin1 , C. Schaefer2 , and T. Walter2 1 Information Security, ETH Zurich, Switzerland

Add to Reading List

Source URL: www22.informatik.tu-muenchen.de

Language: English - Date: 2012-05-22 10:26:04
66Computing / Crime prevention / National security / Computer network security / Data security / Backup / Threat / Physical security / Access control / Security / Computer security / Public safety

Physical and Logical Security Standard Guidelines Document Number SS[removed]State of Arkansas - Office of Information Technology Physical and Logical Security Recommendations Physical security is an essential part of inf

Add to Reading List

Source URL: www.dis.arkansas.gov

Language: English - Date: 2014-03-20 10:22:17
67Electronic engineering / Networking hardware / Computing / Computer networking / Electronics / Logical Link Control / Modem / Wireless access point

IT POL[removed]Office of Information Technology Policy Security: Simultaneous Network Connections Policy:

Add to Reading List

Source URL: doa.louisiana.gov

Language: English - Date: 2009-09-21 17:06:51
68Firefighting in the United States / Disaster preparedness / Incident management / Incident Command System / Emergency / Computer security incident management / Hospital incident command system / Public safety / Emergency management / Management

Regional Operations Coordination (ROC) Task 3, Vol. 1 - ROC Logical Architecture Regional Operations Coordination (ROC) Task 3, Vol. 1 - ROC Logical Architecture TABLE OF CONTENTS Page ii

Add to Reading List

Source URL: www.chart.state.md.us

Language: English - Date: 2001-08-02 11:44:38
69Science / Security / Data flow diagram / Diagrams / Systems analysis / Visualization / Structured analysis / Data model / Infrastructure / Data management / Information technology management / Computer security

Logical Architecture Volume I

Add to Reading List

Source URL: www.iteris.com

Language: English - Date: 2012-01-26 14:46:00
UPDATE