Computer security policy

Results: 3514



#Item
351Information flow / Information theory / Non-interference / HTTP cookie / Security policy / Cross-site scripting / System / Computer security / Security / Cyberwarfare

PDF Document

Add to Reading List

Source URL: lirias.kuleuven.be

Language: English
352Cyberwarfare / Information security / Asset / Security controls / TRAC / Information governance / Vulnerability / Medical record / IT risk / Computer security / Data security / Security

SESLHD POLICY COVER SHEET NAME OF DOCUMENT Information Security Policy (Including Digital Information Asset Security Policy)

Add to Reading List

Source URL: www.seslhd.health.nsw.gov.au

Language: English - Date: 2015-04-02 00:32:14
353Law / Identity management / Social issues / Data privacy / Internet privacy / Information privacy / Data Protection Act / Computer security / Data security / Ethics / Privacy / Security

Data and Privacy Policies Data security policy We control physical security in relation to the information and personal data that is contained at our facilities and restrict access to the site, buildings, computer rooms,

Add to Reading List

Source URL: www.protirus.com

Language: English - Date: 2015-02-04 10:04:56
354International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Organisation for Economic Co-operation and Development / Cyber-security regulation / Computer security / Government / Crime / International Cybercrime / Computer crimes / Cyberwarfare / Security

Microsoft Word - Cybersecurity Policy Making at a Turning Point .docx

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-21 01:56:35
355Computer network security / Data security / Password / Internet privacy / Computer security / Information security / Password policy / Password strength / Security / Crime prevention / National security

SYSTEMS SECURITY Editors: Patrick McDaniel, | Sean W. Smith, Circumvention of Security:

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2013-11-06 01:44:49
356Cryptography standards / Computer network security / Drug Enforcement Administration / Drug policy of the United States / Electronic Prescriptions for Controlled Substances / FIPS 140-2 / Password / Two-factor authentication / Medical prescription / Security / Cryptography / Computer security

Electronic Prescription for Controlled Substances: A Cybersecurity Perspective Samuel Tan, Rebecca Shapiro, Sean W. Smith Dartmouth College Abstract The Electronic Prescription for Controlled Substances (EPCS) is a set o

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2013-09-11 09:10:48
357Computer network security / Sandbox / JavaScript / ECMAScript / Computer security / Caja project / Same origin policy / Computing / Software / Scripting languages

A Two-Tier Sandbox Architecture for Untrusted JavaScript ∗ Phu H. Phung Lieven Desmet

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2012-05-30 05:23:58
358Labour relations / Business ethics / Employment / Computer law / Ireland / Accounting Technicians Ireland / Computer security

Regulations, Policies and Procedures General Policy G01 Code of Conduct 1.

Add to Reading List

Source URL: cms.sae.edu

Language: English - Date: 2013-09-06 04:59:08
359Computing / Internet / Privacy mode / Cookie / Computer security / Evercookie / Internet privacy / HTTP / HTTP cookie

Cookies Policy This version came into effect on 20 MarchFor previous versions of the Cookies Policy, click here. This Cookies Policy is applicable to the Website www.room-matehotels.com

Add to Reading List

Source URL: www.room-matehotels.com

Language: English - Date: 2014-06-30 17:27:26
360Security / Crime prevention / Data security / Information security / National security / Network security / Routing / Cisco IOS / Data mining / Computing / Network architecture / Computer security

Using Hierarchal Change Mining to Manage Network Security Policy Evolution Gabriel A. Weaver, Nick Foti, Sergey Bratus, Dan Rockmore, Sean W. Smith Deparment of Computer Science Dartmouth College, Hanover, New Hampshire

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-04-01 14:57:36
UPDATE