Secure Computing

Results: 5296



#Item
41Software / Computing / Internet privacy / Hypertext Transfer Protocol / World Wide Web / HTTP cookie / Session / HTTPS / Cookie / Google Chrome / Zombie cookie / Secure cookies

Cookie policy (Italian Data Protection Authority Regulations dated 8 May 2014 published in Italian Official Gazette no. 126 on 3 June 2014, implementing Directive EC)

Add to Reading List

Source URL: framesoflife.armani.com

Language: English - Date: 2016-08-05 04:57:11
42Internet privacy / World Wide Web / Computing / Computer security / HTTP cookie / Privacy / Google Analytics / Personally identifiable information / Targeted advertising / Zombie cookie / Secure cookies

Privacy Statement Registering at Tonfly website your information is secure! You data are managed inside the Company with maximum respect of the privacy laws. They are used exclusively to manage your orders or, with expli

Add to Reading List

Source URL: www.tonfly.com

Language: English - Date: 2015-06-01 02:39:10
43Computing / Hypertext Transfer Protocol / Session / World Wide Web / Invoice / Computer network security / Network architecture / Extensible Authentication Protocol

Frequently Asked Questions by Affiliates You will receive an authorization form for every client that has been approved to see you. As an affiliate, it is important that you not schedule any client without getting author

Add to Reading List

Source URL: secure.minesandassociates.com

Language: English - Date: 2013-08-06 16:42:27
44Medicine / Cardiac electrophysiology / Neuroprosthetics / Technology / Security / Wireless networking / Artificial cardiac pacemaker / Biomedical engineering / Cybernetics / Medical device / Ubiquitous computing / Privacy

MOBILE AND UBIQUITOUS SYSTEMS www.computer.org/pervasive Security and Privacy for Implantable Medical Devices Daniel Halperin, Thomas S. Heydt-Benjamin, Kevin Fu, Tadayoshi Kohno, and William H.

Add to Reading List

Source URL: secure-medicine.org

Language: English - Date: 2016-03-07 16:20:02
45Computer hardware / Computer data storage / Computer memory / Non-volatile memory / Standards organizations / Computing / Computer storage devices / Secure Digital / SD Association / Flash memory / Open NAND Flash Interface Working Group / Memory card

Video Speed Class: The new capture protocol of SD 5.0 White Paper | February 2016 www.sdcard.org | ©2016 SD Association. All rights reserved

Add to Reading List

Source URL: www.sdcard.org

Language: English - Date: 2016-02-23 23:21:49
46Computer hardware / Computing / Digital audio players / Information science / Portable media players / USB flash drive / DAISY Digital Talking Book / Secure Digital / USB / Iriver

PLEXTALK Linio Pocket brochure.indd

Add to Reading List

Source URL: www.plextalk.com

Language: English - Date: 2015-12-14 19:22:31
47Cryptocurrencies / Cryptography / Computing / E-commerce / Blockchain / Ethereum / Secure multi-party computation / Secret sharing / Smart contract / Bitcoin / Distributed hash table / Shadow

Enigma: Decentralized Computation Platform with Guaranteed Privacy Guy Zyskind Oz Nathan

Add to Reading List

Source URL: web.media.mit.edu

Language: English - Date: 2015-06-27 14:46:30
48Data security / Policy / Privacy policy / Internet privacy / Personally identifiable information / Privacy / Medical privacy / Government / Computing / Politics

California Department of Social Services (CDSS) PRIVACY NOTICE The CDSS Privacy Notice explains how personal information is collected and maintained when completing applications or forms (online or hardcopy). Personal

Add to Reading List

Source URL: secure.dss.ca.gov

Language: English - Date: 2015-10-28 18:11:18
49Computing / Security / Computer network security / Cybercrime / Data security / Computer security / Cryptography / Secure communication / Cloud computing / Multi-factor authentication / De-perimeterisation

Two Factor Authentication: Security in an Age of Zero Trust Jon Oberheide, CTO, Duo Security Not-so-surprising trends  Cloud

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-18 22:20:40
50Computing / Security / Secure communication / Cyberwarfare / Computer security / Information privacy / Human rights / Data protection / Internet privacy / Privacy / Data mining / Internet security

Large-Scale Collection and Sanitization of Network Security Data: Risks and Challenges∗ (position paper) Phillip Porras Vitaly Shmatikov

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2006-07-31 13:42:23
UPDATE