Computer security policy

Results: 3514



#Item
411Near miss / National Patient Safety Agency / Medical error / Patient safety organization / Computer security incident management / Medicine / Health / Patient safety

Incidents Policy MayBackground This policy outlines BAPAM’s strategy and procedures for reporting and responding to adverse incidents (clinical and non-clinical). It is intended to cover all adverse incidents,

Add to Reading List

Source URL: www.bapam.org.uk

Language: English - Date: 2014-12-17 07:31:43
412National security / Prevention / Computer security / Computer network security / Information security / Security policy / Cloud computing / Access control / Password / Security / Public safety / Crime prevention

AIP_House_Third-Vert.indd

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2010-08-06 15:26:18
413Investigative journalism / Computer security / Crime / Law / Acceptable use policy / Computer crimes / Security / Special agent

Microsoft Word - Newsletter June 2009 Final.doc

Add to Reading List

Source URL: www.intelnetwork.org

Language: English - Date: 2015-05-21 03:23:34
414HTTP / Ajax / Domain name system / Internet privacy / Computer network security / Cross-site request forgery / HTTP cookie / XMLHttpRequest / Same origin policy / Computing / Software / World Wide Web

1 The State of the Cross-domain Nation Sebastian Lekies, Martin Johns and Walter Tighzert SAP Research Karlsruhe {firstname.lastname}@sap.com

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:02
415Electronic warfare / Hacking / Military technology / Cyberwarfare / National security / Military organization / United States Cyber Command / Department of Defense Cyber Crime Center / U.S. Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Military science / Department of Defense Strategy for Operating in Cyberspace

Department of Defense Cyberspace Policy Report A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, Section 934 November 2011

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 20:17:00
416Cryptography / Password / Password policy / Password strength / Passphrase / Phishing / Security / Computer security / Access control

SET AND USE STRONG PASSWORDS Passwords and PINs are used to identify who you are. Sometimes they are the only defense to protect your information against unauthorized access. If your password or PIN is captured, guessed

Add to Reading List

Source URL: www.am-win.com.au

Language: English - Date: 2015-03-30 01:32:32
417Computer network security / National security / Computer security / Password / Liability insurance / Hacker / Security guard / Password policy / Information security / Security / Crime prevention / Public safety

Microsoft Word - Newsletter December 2006.doc

Add to Reading List

Source URL: www.intelnetwork.org

Language: English - Date: 2015-05-21 03:23:34
418Privacy / Computer network security / Internet / Computer law / Content-control software / Internet censorship / Global Network Initiative / Google China / Great Firewall of China / Internet ethics / Computing / Technology

Testimony of Rebecca MacKinnon Visiting Fellow, Center for Information Technology Policy, Princeton University Co-Founder, Global Voices Online (globalvoicesonline.org) “The Google Predicament: Transforming U.S. Cybers

Add to Reading List

Source URL: rconversation.blogs.com

Language: English - Date: 2010-02-15 23:13:10
419Cryptography / Cryptographic software / Password strength / Password policy / Security / Computer security / Password

PDF Document

Add to Reading List

Source URL: dwn.tensionsoftware.com

Language: English
420Etiquette / Internet / Internet culture / Question / Computing / Social psychology / Electronics / Computer security / Acceptable use policy / Email

PDF Document

Add to Reading List

Source URL: www.glasgowlife.org.uk

Language: English - Date: 2014-09-08 11:20:31
UPDATE