Computer security policy

Results: 3514



#Item
391World Wide Web / Scripting languages / Software architecture / Web 2.0 / Cross-platform software / JavaScript / Mashup / HTTP cookie / Same origin policy / Computing / Computer network security / Software engineering

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D4.1

Add to Reading List

Source URL: www.websand.eu

Language: English - Date: 2011-10-25 10:27:30
392Online chat / Instant messaging / Internet / Internet Relay Chat / Internet culture / Videotelephony / Information security / Email / Computing / Computer-mediated communication / Technology

Nusoft Newsletter – IR Series No.31 Tech Overview : An Effective Approach to Network Monitoring and Policy Notifications

Add to Reading List

Source URL: www.nusoft.com.tw

Language: English - Date: 2012-10-23 00:46:27
393Software testing / Vulnerability / Online shopping / Vendor / Full disclosure / RFPolicy / Computer security / Cyberwarfare / Hacking

Zimperium Zero Day Disclosure Policy Summary The following Zimperium Zero Day Disclosure Policy outlines how Zimperium handles responsible vulnerability disclosure to product vendors, Zimperium customers, and the general

Add to Reading List

Source URL: www.zimperium.com

Language: English - Date: 2015-05-26 05:07:50
394National security / Government / Data security / Crime prevention / Committee on National Security Systems / Information security / Information Security Oversight Office / Classified information / Federal Information Security Management Act / Security / Computer security / United States government secrecy

Committee on National Security Systems CNSS Policy No. 18 JuneNational Policy

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 15:09:48
395Computer security / Internet / Cross-platform software / JavaScript / HTTP cookie / Same origin policy / World Wide Web / Proxy server / Proxy auto-config / Computing / Internet privacy / Computer network security

Architectures for Inlining Security Monitors in Web Applications Jonas Magazinius, Daniel Hedin, and Andrei Sabelfeld Chalmers University of Technology, Gothenburg, Sweden Abstract. Securing JavaScript in the browser is

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2013-12-06 11:26:36
396Software / Firewall / Distributed firewall / Iptables / Description logic / Netfilter / Semantic Web Rule Language / PF / Comparison of firewalls / Computer network security / System software / Computing

Confident Firewall Policy Configuration Management using Description Logic ´ Foghl´ William M. Fitzgerald1,2 Simon N. Foley2 M´ıche´ al O u1

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2007-10-22 09:19:27
397Phishing / CUPS / Cyberwarfare / Threat / Computing / Crime / Anti-phishing software / Social engineering / Spamming / Computer network security

A Policy Analysis of Phishing Countermeasures Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in

Add to Reading List

Source URL: www.chariotsfire.com

Language: English - Date: 2014-01-01 11:17:17
398Identity management / Cryptography / Password / One-time password / Security token / Salt / Phishing / Password strength / Password policy / Security / Computer security / Access control

TwoKind Authentication: Protecting Private Information in Untrustworthy Environments (Extended Version) Katelin Bailey, Apu Kapadia, Linden Vongsathorn, Sean W. Smith Dartmouth Computer Science Technical Report TR2008-63

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-08-28 10:16:12
399Access control / XACML / Authorization / OASIS / Radiant Logic / Universal controls / Security / Computer security / Identity management

Access Sentinel Authorization Policy Server for Attribute Based Access Control ViewDS Access Sentinel

Add to Reading List

Source URL: www.viewds.com

Language: English
400Insider / Computer security / United States Department of Homeland Security

National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 15:57:00
UPDATE