CUPS

Results: 2496



#Item
131

Aligning Usability and Security-A Usability Study of POLARIS

Add to Reading List

Source URL: cups.cs.cmu.edu

- Date: 2006-06-13 14:20:15
    132

    Towards Understanding IT Security Professionals and Their Tools David Botta, Rodrigo Werlinger, Andre´ Gagne´ Konstantin Beznosov, Lee Iverson, Sidney Fels, Brian Fisher University of British Columbia, Vancouver, Canad

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    - Date: 2007-06-01 12:05:22
      133

      8 cups fireweed blossoms ¼ cup Alaska Distillery FireWeed Vodka ¼ cup lemon juice 4 cups water 3 pkgs Sure Jell or other powdered pectin 5 cups suger

      Add to Reading List

      Source URL: www.alaskadistillery.com

      - Date: 2016-03-26 20:07:43
        134Security / Computer security / Access control / Computer access control / Identity management / XACML / Authorization / Privacy / Information visualization / Internet privacy / Situation awareness

        Information Visualization for Rule-based Resource Access Control Jaime Montemayor, Andrew Freeman, John Gersh, Thomas Llanso, Dennis Patrone The Johns Hopkins University Applied Physics LaboratoryJohns Hopkins Roa

        Add to Reading List

        Source URL: cups.cs.cmu.edu

        Language: English - Date: 2006-06-02 15:04:21
        135Computer security / Software / Computing / Computer access control / Xerox DocuShare / Access control / Group / Document collaboration / Access control list / Shared resource / File system permissions / Outlook.com

        How Users Use Access Control D. K. Smetters Nathan Good PARC

        Add to Reading List

        Source URL: cups.cs.cmu.edu

        Language: English - Date: 2009-05-30 23:35:56
        136Cryptography / Public key infrastructure / Cryptographic software / Email authentication / Key management / Email encryption / Public-key cryptography / S/MIME / Key / Encryption / Email / Pretty Good Privacy

        Why Johnny Still Can’t Encrypt: Evaluating the Usability of Email Encryption Software Steve Sheng Levi Broderick

        Add to Reading List

        Source URL: cups.cs.cmu.edu

        Language: English - Date: 2006-06-02 21:42:44
        137

        BUTTERNUT SQUASH SOUP WITH SAGE 1 tablespoons butter 1 onion, coarsely chopped 1 tablespoon chopped fresh sagepound butternut squash, halved, peeled, seeded, chopped (about 5 cups) 5 cups canned low-salt chicken

        Add to Reading List

        Source URL: lwvwestportct.org

        - Date: 2015-10-24 09:13:10
          138Computing / Software / Digital media / Social networking services / Videotelephony / Internet privacy / Privacy / Email / Information privacy / Presence information / Instant messaging / Privacy concerns with social networking services

          Peripheral Privacy Notifications for Wireless Networks Braden Kowitz Lorrie Cranor Carnegie Mellon University, HCII

          Add to Reading List

          Source URL: cups.cs.cmu.edu

          Language: English - Date: 2005-06-21 09:58:21
          139Spamming / Computing / Social engineering / Cyberspace / Cybercrime / Crime / Email / Deception / Phishing / Gmail / Advance-fee scam / Internet security

          Microsoft Word - interviews-soupsdoc

          Add to Reading List

          Source URL: cups.cs.cmu.edu

          Language: English - Date: 2006-06-13 15:20:00
          140Software / Computer printing / Computing / Printing / Device drivers / Digital press / Computer printers / Open formats / CUPS / KDE / Printer / PostScript

          The KDEPrint Handbook Version−b Kurt Pfeifle, Danka Deutschland GmbH Copyright © 2001 Kurt Pfeifle

          Add to Reading List

          Source URL: ftp.nluug.nl

          Language: English - Date: 2003-03-10 07:08:19
          UPDATE