Computer security policy

Results: 3514



#Item
261Malware / Spamming / Computer network security / Email / Phishing / Social engineering / Password policy / Password / Spyware / Computing / System software / Internet

学術情報処理センター利用の手引き(案)

Add to Reading List

Source URL: www.u.tsukuba.ac.jp

Language: English - Date: 2010-09-21 00:46:06
262Email / Computer security / Acceptable use policy / Spam / Email spam / Internet safety / Internet / Computing / Spamming

PDF Document

Add to Reading List

Source URL: www.isafe.org

Language: English - Date: 2015-07-17 15:14:29
263Crime prevention / National security / Transport / Indian Railways / Rail transport in India / Information security management system / Security policy / Computer security / John N. Warfield / Security / Government / Data security

Transport Research Arena 2014, Paris Interpretive structural modelling of security system for better security management in railways Anoop Srivastavaᵃ, Sanjeev Swamiᵇ, Devender Banwetᵃ,ᵇ,c,*

Add to Reading List

Source URL: tra2014.traconference.eu

Language: English - Date: 2015-01-12 10:33:56
264Crime prevention / National security / Computer network security / Password / Authorization / Computer security / Authentication / Credential / Password policy / Security / Identity management / Access control

PDF Document

Add to Reading List

Source URL: www.cisecurity.org

Language: English - Date: 2015-03-11 09:33:03
265Health Insurance Portability and Accountability Act / Computer security / Law / Computing / Security / Password / Cloud computing

UCLA  Data  Use  Policy  for  the  IDRE  Cloud  Archival  Storage  Service   Faculty  and  staff  use  of  cloud  storage  services  offered  by  UCLA  

Add to Reading List

Source URL: cloud.ucla.edu

Language: English - Date: 2014-03-03 19:06:52
266Computing / Public key certificate / Software / Windows / Microsoft Outlook / Computer architecture / Certificate policy / X.509 / Public-key cryptography / Key management / Revocation list

UNCLASSIFIED Report Number: C4-017R-01 Guide to Using DoD PKI Certificates in Outlook 2000 Security Evaluation Group

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2003-10-20 12:38:28
267Web services / Identity management / Identity management systems / Federated identity / WS-Trust / WS-Security / WS-Policy / WS-Addressing / .ws / Computing / Computer security / Security

WS-Trust 1.3 OASIS Standard 19 March 2007 Artifact Identifier: ws-trust-1.3-spec-os Location:

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2007-03-23 14:16:48
268Security / Electronic commerce / Law / Data privacy / Data security / Information security / Privacy policy / Transport Layer Security / Family Educational Rights and Privacy Act / Computer security / Computing / Computer law

ClassDojo security and privacy overview for principals, technology directors and other administrators 1. Introduction ClassDojo  helps  teachers,  parents  and  students  address  a  critical  part  of  educat

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2014-12-29 17:27:12
269Computer vision / European Space Agency / Global Monitoring for Environment and Security / Remote sensing / Geography / GIS software / GIS applications / GMOSAIC / SAGA-EO Project / Geographic information systems / Space policy of the European Union / Spaceflight

2_Expertise_Profile_GMES_CC_ReSAC_Bulgaria

Add to Reading List

Source URL: gmes-bg.org

Language: English - Date: 2011-04-07 03:57:32
270Computer network security / Cryptographic software / Password policy / Cyberwarfare / Password notification email / Password / Security / Computer security

Common Error Messages ・ Login Window Message Cause Invalid credentials

Add to Reading List

Source URL: engine.kubota.co.jp

Language: English - Date: 2015-03-30 00:20:16
UPDATE