Computer security conference

Results: 514



#Item
341Ethics / Personal life / Personally identifiable information / Public safety / Identity management / Information security / Internet privacy / Privacy / Security / Data security / Computer security

Strategy for Protecting Personally Identifiable Information (PII) Texas Workforce Conference November 2013

Add to Reading List

Source URL: www.texasworkforce.org

Language: English - Date: 2014-01-14 08:47:23
342Big West Conference / California State University /  Long Beach / Computing / Digital media / Password / Internet / Login / Computer lab / Computer security / Security / Computer network security / American Association of State Colleges and Universities

Policy for Public Computer Use

Add to Reading List

Source URL: www.csulb.edu

Language: English - Date: 2007-10-11 11:26:15
343Data management / Data / Computer security / Programming language implementation / Software transactional memory / XACML / Authorization / Access control / Transactional memory / Transaction processing / Concurrency control / Computing

Published in CCS’08: Proceedings of the 15th ACM Conference on Computer and Communications Security, Alexandria, Virginia, October[removed]Enforcing Authorization Policies using Transactional Memory Introspection Arnar B

Add to Reading List

Source URL: www.ru.is

Language: English - Date: 2008-09-03 11:20:24
344Cyberwarfare / Wireless security / Wi-Fi Protected Access / Passphrase / Computer security / Computing / Service set / Computer network security / Cryptographic protocols / Wireless networking

Step by Step Instructions for Using the MED-Duluth Conference Center Wireless Network

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2010-10-14 15:09:07
345Identity / Fraud / Identity theft / Theft / Organized crime / Identity fraud / National Fraud Authority / Computer crime / Money laundering / Crimes / Law / Ethics

Invited presentation to the 9th National Security Conference, Sydney[removed]February 2011 Emerging and future trends in organised

Add to Reading List

Source URL: www.aic.gov.au

Language: English - Date: 2011-03-21 06:58:08
346Safety culture / Security / Prevention / Computer programming / Classical cipher / The Alphabet Cipher / Nuclear safety / Public safety / Safety

PARTNERS IN PREVENTION 2011 H E A LT H & S A F E T Y C O N F E R E N C E & T R A D E S H OW Formerly Safety Solutions IAPA Health & Safety Conference & Trade Show E A R LY B I R D O F F E R ! Register on or before Septe

Add to Reading List

Source URL: healthandsafetyontario.ca

Language: English - Date: 2011-07-25 14:34:32
347Crime prevention / Computer security / Law enforcement / National Security Agency / Access control / United States Environmental Protection Agency / Surveillance / Security / National security / Public safety

Agency Roles and Access Control New AQS Security Model Agency Access Control National Ambient Air Monitoring Conference August 2014

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2014-08-29 14:28:56
348FTP / Internet standards / Internet protocols / Computer network security / File Transfer Protocol / Secure Shell / Firewall / Communications protocol / Files2u / Computing / Data / Internet

CISC Business Process Workgroup (BPWG) - Data Interchange Conference Call Date: Tuesday, January 6, 2004

Add to Reading List

Source URL: www.crtc.gc.ca

Language: English - Date: 2004-02-06 13:02:18
349National security / Article 11 of the European Convention on Human Rights / Cheltenham / Government Communications Headquarters / Department of Defense Cyber Crime Center / Security / Computer security / Cyberwarfare

Conference News Letter December 2013

Add to Reading List

Source URL: www.cesg.gov.uk

Language: English - Date: 2014-01-23 00:20:18
350Cyberwarfare / Computing / Malware / Configuration management / McAfee / Threat / Computer security / Computer network security / Security

Security Configuration Management Security Automation Conference September 28, 2010 Kelley Dempsey Computer Security Division Information Technology Laboratory

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:54
UPDATE