Computer security policy

Results: 3514



#Item
531Password / Cryptographic software / Password policy / Password manager / Security / Access control / Computer security

Colleen Koranda Usable Privacy and Security I February 7, 2006 Initial Password Activity

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-02-07 19:49:50
532Military science / Computer crimes / Electronic warfare / Military technology / Military / United States Cyber Command / International Multilateral Partnership Against Cyber Threats / Critical infrastructure protection / Joint Professional Military Education / National security / Cyberwarfare / United States Department of Homeland Security

REPORT for INTERNATIONAL RELATIONS and PUBLIC POLICY PELL CENTER

Add to Reading List

Source URL: www.salve.edu

Language: English - Date: 2014-01-31 09:34:31
533McAfee / Hacking / Computer network security / Antivirus software / SCADA / Vulnerability / Operation Aurora / Threat / Host Based Security System / Cyberwarfare / Computer security / Security

Data Sheet McAfee Embedded Control System integrity, change control, and policy compliance in one solution for integrated control systems

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-28 13:56:11
534Privacy / Law / Computer law / Information privacy / IB Diploma Programme / Ethics / International Safe Harbor Privacy Principles / Data security / Information / Data privacy / Data management / Privacy law

IB policy document GLOBAL DATA PROTECTION POLICY Version: 2.0

Add to Reading List

Source URL: ibo.org

Language: English - Date: 2014-11-04 10:13:10
535Law / Security / Privacy / Data Protection Act / Information privacy / Personally identifiable information / Information privacy law / Data protection (privacy) laws in Russia / Data privacy / Privacy law / Computer law

HENLEY COLLEGE COVENTRY DATA PROTECTION POLICY 1 INTRODUCTION 1.1

Add to Reading List

Source URL: www.henley-cov.ac.uk

Language: English - Date: 2014-12-08 05:12:52
536Information technology management / Public safety / Data security / Computer law / Information security / Federal Information Security Management Act / Change management / Incident management / Configuration management / Computer security / Security / Computing

Policy Number (A145) University-wide Policy Change and Incident Management Policy Date Approved:

Add to Reading List

Source URL: umshare.miami.edu

Language: English
537Data security / Password / Crack / Information security / Password policy / Password manager / Security / Computer security / Cryptography

(Note: Set up room using Accelerated learning peripheals, i

Add to Reading List

Source URL: www.iwar.org.uk

Language: English - Date: 2008-11-19 05:52:48
538United States Department of Homeland Security / Public safety / Computer crimes / Electronic warfare / Military technology / Cyber-security regulation / Critical infrastructure protection / International Multilateral Partnership Against Cyber Threats / Computer security / National security / Cyberwarfare / Security

Doug Johnson serves as Senior Policy Analyst for the American Bankers Association, where his public policy responsibilities in

Add to Reading List

Source URL: oversight.house.gov

Language: English - Date: 2015-03-17 17:56:25
539Privacy / Human rights / Crime prevention / Law enforcement / Internet privacy / Surveillance / Mass surveillance / Tor / Computer surveillance / Security / Ethics / National security

Do We Care About Surveillance? Edward Snowden’s Impact And Policy Implications Arya Azma, Louis DeScioli, and Evan Marshall 1  

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2014-08-10 11:09:32
540ISO standards / Ubiquitous computing / Computer security / Security / Contactless smart card / FIPS 140 / ISO/IEC / Card reader / Subscriber identity module / Cryptography / Cryptography standards / Smart cards

Non-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-16 10:01:24
UPDATE