and Security Technologies

Results: 1110



#Item
461Internet / Denial-of-service attack / LOIC / Prolexic Technologies / Botnet / Transmission Control Protocol / Network Time Protocol / SYN flood / NTP server misuse and abuse / Denial-of-service attacks / Computer network security / Computing

THREATS AND MITIGATIONS A GUIDE TO MULTI-LAYERED WEB SECURITY

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2015-04-08 08:42:01
462Computing / Videotelephony / Teleconferencing / Cross-platform software / Web 2.0 / Telehealth / Skype security / Hutchison 3G / Skype Technologies / Software / Skype / Computer-mediated communication

Using Skype for Telehealth Sessions: Understanding the benefits and the risks Using Skype for Telehealth Many clinicians are using Skype for clinical video consultations. Skype is free video-call software which can be do

Add to Reading List

Source URL: www.naccho.org.au

Language: English - Date: 2013-02-03 20:57:20
463Education in England / Becta / Department for Children /  Schools and Families / Information technology education / University of Warwick / Safety culture / National Telecommunications and Information Administration / Information and communication technologies in education / Occupational safety and health / Technology / Safety / Security

E-safety Developing whole-school policies to support effective practice Foreword: Developing a whole-school approach to internet safety The internet and other digital and information technologies are powerful tools, whi

Add to Reading List

Source URL: behaviour.education.qld.gov.au

Language: English - Date: 2015-01-04 21:45:56
464Crime prevention / Surveillance / Security guard / Closed-circuit television / Airport security / Information security / Security / Public safety / National security

3B. CCTV FOR HOTSPOT LOCATIONS & TECHNOLOGIES SUPPORTING CCTVS[removed]PROJECT SUMMARY The _CCTV_Guidelines_ and _CCTV_Technical_Advice_ publications referred to in section 1 of the Grant Guidelines are references for

Add to Reading List

Source URL: communitysafety.police.wa.gov.au

Language: English - Date: 2013-11-11 19:47:59
465Backup / Data security / Server / Data center / Application server / Downtime / Information security audit / Load balancing / Computing / Concurrent computing / System software

Application Availability ftwilliam.com strives to maintain four nine[removed]%) availability of its systems and software. Numerous technologies and procedures ensure the availability of web-based services and customer’s

Add to Reading List

Source URL: www.ftwilliam.com

Language: English - Date: 2013-01-23 15:26:47
466Computer networking / Network performance / Proxy server / WAN optimization / Load balancing / Application firewall / Server / World Wide Web / Web server / Computing / System software / Internet privacy

Web Security and Optimization CacheGuard Technologies Ltd Control and protect the Web

Add to Reading List

Source URL: www.cacheguard.com

Language: English - Date: 2015-01-28 09:55:20
467Communication / Email / Computer security / Internet / Information and communications technology / Information and communication technologies in education / Password / Internet privacy / Acceptable use policy / Computing / Technology / Information technology

POLICY Acceptable Use Policy Purpose To specify the acceptable use of Macquarie University Information and

Add to Reading List

Source URL: mq.edu.au

Language: English - Date: 2014-06-24 00:49:01
468Shavlik Technologies / Severnside / Patch / LANDesk / Vulnerability / Affordable housing / System software / Software / Computing

Shavlik® Success Story: Severnside Housing Severnside Housing Severnside Housing Enhances Security and Safeguards Service Quality with Shavlik Protect

Add to Reading List

Source URL: rs.shavlik.com

Language: English - Date: 1999-12-31 19:00:00
469Information and communications technology / Information and communication technologies in education / Password / Information technology / Communication / Technology

ICT ACCEPTABLE USE POLICY 1 Purpose This Policy provides the framework for the use and the security of AFTRS’ Information and Communications

Add to Reading List

Source URL: www.aftrs.edu.au

Language: English - Date: 2015-02-24 23:14:24
470Human–computer interaction / Surveillance / RFdump / Impinj / ODIN technologies / Radio-frequency identification / Automatic identification and data capture / Technology

RFID SECURITY February 2008 © The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-03-29 08:30:10
UPDATE