Computer security policy

Results: 3514



#Item
601Windows Server / Computer security / Data loss prevention software / Windows Vista / Windows / Universal Serial Bus / Mobile device management / USB flash drive / File system / Computing / Microsoft Windows / Computer architecture

Device Lock ® GROUP POLICY-INTEGRATED DATA LEAK PREVENTION (DLP) FOR PROTECTING

Add to Reading List

Source URL: www.devicelock.com

Language: English - Date: 2014-11-06 10:41:13
602Law / Privacy / 106th United States Congress / Computer law / Gramm–Leach–Bliley Act / United States federal banking legislation / Internet privacy / Privacy policy / Information security / Ethics / Computing / Privacy law

Microsoft PowerPoint - PrivacyPoliciesAndProceeduresComplaints.ppt

Add to Reading List

Source URL: www.netcotitle.com

Language: English - Date: 2015-04-15 15:06:55
603Data privacy / Computing / Computer law / Data Protection Act / Barnardisation / Personally identifiable information / Information privacy / Internet privacy / Information security / Ethics / Privacy / Security

Information Assurance Policies and Guidance Policy and Guidance on Anonymising Personal Data for Secondary Uses February 2014

Add to Reading List

Source URL: www.leicester.gov.uk

Language: English - Date: 2015-03-26 12:10:35
604Computer security / Social engineering / Cryptographic software / Password policy / Password strength / Security / Cryptography / Password

Monthly Quizzes January Quiz 1. T

Add to Reading List

Source URL: www.iwar.org.uk

Language: English - Date: 2008-11-19 05:51:37
605Access control / Computer security / Payment systems / Electronic commerce / Self-service password reset / Password policy / Password / Security / Transaction authentication number

Microsoft Word - Internet Payments Documentation.doc

Add to Reading List

Source URL: payments.sulphurspringstx.org

Language: English - Date: 2011-11-14 18:22:36
606Crime prevention / National security / Identity management / Computer network security / Password / Authorization / Group / User / System administrator / Security / Computing / Computer security

Policy No: AP-BA-03.2 TITLE:

Add to Reading List

Source URL: www.uno.edu

Language: English - Date: 2014-07-18 15:46:54
607Least developed country / Computer security / Vulnerability / Cyberwarfare / National Adaptation Programme of Action / Adaptation to global warming / Climate change policy / Risk / Social vulnerability

Case Study Making national adaptation plans work for the poor Canadian Coalition on

Add to Reading List

Source URL: www.careclimatechange.org

Language: English - Date: 2010-08-05 00:55:48
608Electronic engineering / Wireless / Wireless security / Wireless LAN / Wireless access point / Virtual LAN / IEEE 802.1X / Policies promoting wireless broadband in the United States / Wi-Fi / Wireless networking / Technology / Computer network security

Wireless Policy 1. Purpose The purpose of this policy is to secure and protect the information assets owned by Ithaca College. Ithaca College provides computer devices, networks, and other electronic information systems

Add to Reading List

Source URL: www.ithaca.edu

Language: English - Date: 2010-01-11 06:22:29
609Ciphertext indistinguishability / Ciphertext / Security / Semantic security / RSA / Applied mathematics / Cryptography / Homomorphic encryption / Cyberwarfare

Policy-Based Non-interactive Outsourcing of Computation using multikey FHE and CP-ABE∗ Michael Clear† and Ciar´an McGoldrick School of Computer Science and Statistics, Trinity College Dublin {clearm, Ciaran.McGoldri

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-29 11:13:19
610Terrorism / Cyberwarfare / United States Department of Homeland Security / Counter-terrorism / Military technology / Richard A. Clarke / International Multilateral Partnership Against Cyber Threats / Computer security / Critical infrastructure protection / National security / Security / Computer crimes

‘Cyber Gurus’: A rhetorical analysis of the language of cybersecurity specialists and the implications for security policy and critical infrastructure protection

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-05-04 18:19:17
UPDATE