Security policy

Results: 30919



#Item
851Education policy / Experiential learning / Science and technology / Science education / Science /  technology /  engineering /  and mathematics / Rutgers School of Engineering / Electric Power Research Institute

School of Engineering Review, The role of Engineering Education is to ensure economic vitality and security through research, pedagogy and community engagement Haiti, 2010, Death toll >200,000 SanFrancisco, ‘89

Add to Reading List

Source URL: president.unm.edu

Language: English
852Foreign relations of Armenia / European Neighbourhood Policy / Eastern Partnership / European integration / Common Security and Defence Policy / European Union Association Agreement / Common Foreign and Security Policy / UkraineEuropean Union relations / Elena Korosteleva

EU Global Strategy: Role and Engagement of Eastern Partners in European Security Conference Report March 2016 Vilnius, Lithuania The International Security Experts Conference “EU Global Strategy: Role and Engagement o

Add to Reading List

Source URL: www.eesc.lt

Language: English - Date: 2016-04-22 08:29:54
853Computer access control / Identity management / Identity management systems / Metadata standards / XACML / SAML 2.0 / Security Assertion Markup Language / Medical record

Swiss Electronic Patient Dossier (EPD-CH) Policy Enforcement by Authorization Decision Request (ADR-CH) and Policy Management by

Add to Reading List

Source URL: www.ihe-suisse.ch

Language: English - Date: 2016-05-17 20:50:28
854Identity documents / Privacy / Internet privacy / Data security / Personal life / Personally identifiable information / HTTP cookie / Medical privacy / Personal Information Agent

MADELYN PENDANTS WEBSITE ONLINE PRIVACY POLICY Welcome to the Madelyn Pendants website! Protecting your personal information is very important to us, and we respect your privacy. This Privacy Policy is meant to explain h

Add to Reading List

Source URL: www.madelynpendants.com

Language: English - Date: 2014-10-29 13:51:19
855Cryptographic protocols / Key management / Internet protocols / IPsec / Cryptography / Internet Key Exchange / DiffieHellman key exchange / Password / Key / FIPS 140-2 / Block cipher mode of operation / Transport Layer Security

Cisco IOS 15.5M Router Security Policy Integrated Services Router (ISR) 891W, 1941W, 829W FIPSNon Proprietary Security Policy Level 1 Validation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-06-02 15:30:24
856Actuarial science / Security / Space policy of the European Union / Copernicus Programme / European Space Agency / Risk management / Risk

Microsoft Word - idp-gmesdoc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-02-02 08:44:12
857Agronomy / Malnutrition / Sustainable food system / Food industry / Food systems / Food security / Food / Sustainability / Urban agriculture / Agriculture / Famine / Food policy

Food Systems paper June 06

Add to Reading List

Source URL: www.gecafs.org

Language: English - Date: 2009-07-22 05:57:26
858Key management / Public key infrastructure / Public-key cryptography / Transport Layer Security / Energy Sciences Network / United States Department of Energy / Certificate policy / Revocation list

Procedures and guidelines for the

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2006-01-13 18:10:59
859Labour economics / Unemployment / Labour law / Employment / Social justice / Discouraged worker / Job security / Layoff / Unemployment in the United States / Unemployment in Poland

Policy Brief The National Poverty Center’s Policy Brief series summarizes key academic research findings, highlighting implications for policy. The NPC encourages the dissemination of this publication and grants full r

Add to Reading List

Source URL: npc.umich.edu

Language: English - Date: 2016-07-14 21:13:19
860Identity management / Password / Security / Social networking services / Computer access control / Twitter / Social media / Crypt / Challengeresponse authentication / Password policy / Password strength

Social Media as a Resource for Understanding Security Experiences: A Qualitative Analysis of #Password Tweets Paul Dunphy1 , Vasilis Vlachokyriakos1 , Anja Thieme1 , James Nicholson2 , John McCarthy3 , Patrick Olivier1 1

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 12:56:54
UPDATE