Computer security policy

Results: 3514



#Item
571Network architecture / Computer architecture / Virtual private networks / Internet protocols / IPsec / Network Extrusion / VoIP VPN / Computer network security / Computing / Internet privacy

Virtual Private Network (VPN) Policy A virtual private network is used to provide secure, encrypted communication between a network and a remote host or other remote networks over the public Internet. VPNs allow the esta

Add to Reading List

Source URL: www.fpweb.net

Language: English - Date: 2014-12-23 16:56:42
572Public safety / Law enforcement in the United States / Port security / Maritime security / Safety / Computer security / Security / Crime prevention / National security

Security Policy 9-1 Date Approved: 25 June.

Add to Reading List

Source URL: www.nqbp.com.au

Language: English - Date: 2013-08-01 19:28:50
573Environment / Robert S. Strauss Center for International Security and Law / Psychological resilience / Sociology / Disaster / Computer security / Food security / Risk / Social vulnerability / Vulnerability

policy brief No. 3 C l i m at e C h a n g e and African P o l i t i c a l S ta b i l i t y Program

Add to Reading List

Source URL: reliefweb.int

Language: English - Date: 2011-09-27 16:16:28
574Cryptography / Password / Identity management systems / Transaction authentication number / Password policy / Password cracking / Security / Computer security / Access control

LOGIN SERVICE SECURITY Rachel Engel – rachel[at]isecpartners[dot]com iSEC Partners, Inc 123 Mission Street, Suite 1020 San Francisco, Cahttps://www.isecpartners.com

Add to Reading List

Source URL: www.isecpartners.com

Language: English - Date: 2014-01-02 06:52:58
575Identity management systems / Computer security / Identity management / Cryptography / Self-service password reset / Password policy / Password / Security / Access control

AD Self Password Reset Installation and configuration AD Self Password Reset Installation 1

Add to Reading List

Source URL: www.dovestones.com

Language: English - Date: 2014-11-07 05:39:31
576Computer network security / Routers / Cisco Catalyst / Cisco Systems / TACACS+ / Cisco IOS / TACACS / FIPS 140 / IPsec / Computing / Network architecture / Data

Microsoft Word - 3850_3650_Security_Policy.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-20 12:34:19
577Privacy law / Public safety / Computing / Data security / Information security / Information privacy / Internet privacy / Access control / Credit card / Computer security / Security / Data privacy

Policy Number (A190) University-wide Policy Remote Access Policy Date Approved:

Add to Reading List

Source URL: umshare.miami.edu

Language: English
578Computer security / Security / Password / Internet privacy / Acceptable use policy / Network security / Digital Millennium Copyright Act / Password policy / Logical security / Computing / Email / Internet

Acceptable Use Policy Department of Information Technology Olivet Nazarene University

Add to Reading List

Source URL: it.olivet.edu

Language: English - Date: 2014-12-15 16:07:18
579Computer security / Crime prevention / Data security / University of Colorado Colorado Springs / Physical security / Data center / Network security / Vulnerability / Information security management system / Security / Public safety / National security

CAMPUS POLICY Now is the tie for all good men to POLICY NUMBER:

Add to Reading List

Source URL: www.uccs.edu

Language: English - Date: 2015-04-22 23:03:13
580Computer security / World Trade Center / Public administration / Government / Economic policy / Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology

2003 Annual Report THE NIST VISITING COMMITTEE ON ADVANCED TECHNOLOGY U.S. DEPARTMENT OF COMMERCE

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-03-03 15:13:10
UPDATE