Computer security policy

Results: 3514



#Item
681HTTP cookie / Computer security / Google Analytics / Session / Registered user / Cookie / Zombie cookie / Evercookie / Internet privacy / Internet / Computing

PRIVACY POLICY AND COOKIES ZARA 1. Each time you use this website, you will be under the Privacy Policy and Cookies which is in force at all times and you should review this text to be sure that you agree with it. 2. Per

Add to Reading List

Source URL: static.zara.net

Language: English - Date: 2015-04-09 06:16:54
682Acceptable use policy / Computer security / Etiquette / Technology / Education / Learning platform / Becta / Email spam / Internet privacy / Email / Computing / Internet

General principles on Creating an Acceptable Use Policy The following advice is taken from the Becta document ‘AUPs in context: Establishing safe and responsible online behaviours’ published in February 2009, and y

Add to Reading List

Source URL: ngfl.northumberland.gov.uk

Language: English - Date: 2013-05-08 05:21:06
683Network security / Computer security / Content-control software / Information security audit / Password policy / Security / Computer network security / Password

Questions for technical support (especially e-safety) It is a school’s responsibility to ensure that their chosen technical support provider(s) carry out all the necessary measures to do with e-safety and other technic

Add to Reading List

Source URL: slp.somerset.gov.uk

Language: English - Date: 2012-06-13 05:25:03
684Object-oriented programming / Access control / Identity management / X.509 / Object database / Separation of mechanism and policy / Security / Computing / Computer security

A Flexible Security System for Metacomputing Environments Adam Ferrari, Frederick Knabe, Marty Humphrey, Steve Chapin, and Andrew Grimshaw Department of Computer Science University of Virginia, Charlottesville, VA 22903,

Add to Reading List

Source URL: legion.virginia.edu

Language: English - Date: 1998-12-04 14:58:14
685Computer security / Security / Federated identity management / Shibboleth / NITLE / Web Services Discovery / Athens / Identity management / Federated identity / System software

Federated Identity Management and Shibboleth: Policy and Technology for Collaboration

Add to Reading List

Source URL: clac.union.edu

Language: English - Date: 2008-06-26 15:41:52
686Public safety / National security / Crime prevention / Information security / Password / IT risk / Incident management / Vulnerability / Physical security / Security / Data security / Computer security

Information Security Policy Responsible Officer: Chief Information Officer Last Updated:

Add to Reading List

Source URL: w3.unisa.edu.au

Language: English - Date: 2014-06-02 02:48:40
687Security / Single sign-on / Security Assertion Markup Language / RADIUS / Password / Web Access Management / Identity management system / Computer security / Identity management / Computing

A cornerstone of trustworthy web communities By offering a coherent infrastructure that secures your web applications, Evidian Web Access Manager makes your organization’s security policy more consistent, reduces mana

Add to Reading List

Source URL: www.evidian.com

Language: English - Date: 2015-03-09 12:43:01
688Cryptography / Password strength / Password / Crypt / OTPW / Random password generator / Security / Computer security / Access control

Password Policy Simulation and Analysis Richard J. K. Shay Purdue University West Lafayette, IN Abhilasha

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2012-07-19 22:34:09
689Urban studies and planning / Terminology / Computer network security / Economic development / Public policy / Smart city / Smart grid / Computer security / Cyberwarfare / Energy / Technology / Organizational theory

WHITE PAPER An Emerging US (and World) Threat: Cities Wide Open to Cyber Attacks Cesar Cerrudo

Add to Reading List

Source URL: www.ioactive.com

Language: English
690Security / Computer security / Password policy / Privileged password management / Password / .edu / Access control

Access to My PL@Edu for non-DEC users Teachers from non-government schools, parents, preservice teachers and school community members can enrol in a selection of NSW Department of Education and Communities’ events for

Add to Reading List

Source URL: www.det.nsw.edu.au

Language: English - Date: 2014-07-20 23:34:04
UPDATE