Computer security policy

Results: 3514



#Item
581Metrology / Computer security / Public administration / NIST Enterprise Architecture Model / Government / Economic policy / Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology

VISITING COMMITTEE ON ADVANCED TECHNOLOGY

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-03-03 15:13:10
582Computer security / Library / Internet / Northern Illinois University / Acceptable use policy / Electronic Information for Libraries / Decline of library usage / Illinois / Chicago metropolitan area / Library science

Internet Policy The primary purpose of the computers in the University Libraries is to provide NIU community members with access to information which supports learning, teaching, and scholarly research. Use of the comput

Add to Reading List

Source URL: www.ulib.niu.edu

Language: English - Date: 2013-06-25 15:12:55
583Object-oriented programming / Access control / Identity management / X.509 / Object database / Separation of mechanism and policy / Security / Computing / Computer security

A Flexible Security System for Metacomputing Environments Adam Ferrari, Frederick Knabe, Marty Humphrey, Steve Chapin, and Andrew Grimshaw Department of Computer Science University of Virginia, Charlottesville, VA 22903,

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 1998-12-04 14:58:14
584Acceptable use policy / Computer security / Etiquette / BT Group / Be Unlimited / Spam / Email / Internet / Computing

Burlington Telecom High-Speed Internet Acceptable Use Policy 1. INTRODUCTION Burlington Telecom’s (“BT”) Acceptable Use Policy ("AUP") is intended to help enhance the use of the Internet by preventing unacceptable

Add to Reading List

Source URL: www.burlingtontelecom.net

Language: English - Date: 2015-02-26 11:19:05
585National security / United States government secrecy / Computer network security / National Information Assurance Partnership / Common Criteria Evaluation and Validation Scheme / Common Criteria Testing Laboratory / Protection Profile / Common Criteria / Committee on National Security Systems / Security / Computer security / Evaluation

Committee on National Security Systems CNSS Policy NoJune 2013 NATIONAL POLICY GOVERNING THE ACQUISITION OF

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2013-07-09 07:21:16
586Cryptography / Password / Crypt / John the Ripper / Password policy / Cognitive password / Computer security / Security / Access control

Does My Password Go up to Eleven? The Impact of Password Meters on Password Selection Serge Egelman1 , Andreas Sotirakopoulos2 , Ildar Muslukhov2 , Konstantin Beznosov2 , and Cormac Herley3 1 2

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2013-04-29 12:12:39
587Public safety / Prevention / Information technology management / National security / Information security / Network security / Security policy / IT risk management / ISO/IEC 27002 / Security / Computer security / Data security

ISPME Version 12 Data Sheet Information Security Policies Made Easy, Version 12 is the latest version of the “gold standard” information security policy resource used by over 9000 organizations worldwide. Based on th

Add to Reading List

Source URL: www.informationshield.com

Language: English - Date: 2012-02-08 06:58:28
588North Central Association of Colleges and Schools / Rocky Mountain Athletic Conference / University of Colorado Colorado Springs / University of Colorado / Computer security / Colorado Springs /  Colorado / The Scribe / Colorado counties / Geography of Colorado / El Paso County /  Colorado

CAMPUS POLICY Now is the tie for all good men to POLICY NUMBER:

Add to Reading List

Source URL: www.uccs.edu

Language: English - Date: 2015-04-22 23:03:13
589Password / System administration / Su / Password strength / Password policy / System software / Security / Computer security

CXL SECURE AZScan Report for Demo 07-Dec:24

Add to Reading List

Source URL: www.cxlsecure.com

Language: English - Date: 2008-12-08 19:27:52
590Computer security / Identity management systems / Cryptographic software / Password policy / Password synchronization / Security / Password / Access control

Microsoft Word - 3rd Party Receipts.docx

Add to Reading List

Source URL: www.csbsoftware.net

Language: English - Date: 2014-10-20 12:33:53
UPDATE