Computer security policy

Results: 3514



#Item
691Computer security / Login / User / Cryptographic software / Password policy / Password manager / Security / Access control / Password

The Entry-Master® System Training Guide Chapter 2 - Lesson 1 Lesson 1 – Logging into the System

Add to Reading List

Source URL: www.entry-master.com

Language: English - Date: 2014-01-14 13:07:22
692Computer network security / Crime prevention / National security / Association of Commonwealth Universities / London School of Hygiene & Tropical Medicine / Threat / Information security / Vulnerability / Acceptable use policy / Computer security / Security / Cyberwarfare

LSHTM Information Management and Security Policy Supporting policy 2: Acceptable Use Policy Endorsed by Academic Affairs - Feb[removed]Introduction 1.1 Purpose

Add to Reading List

Source URL: www.lshtm.ac.uk

Language: English - Date: 2015-04-11 20:57:49
693Crime prevention / National security / Computer network security / Information security / Asset / Access control / Security / Computer security / Data security

“Advantages in defining and adopting a security policy” Information & Network Security Workshop - Bologna, 1st July 2003 Speaker: Angelo Perniola - Infosec Project Manager [removed]

Add to Reading List

Source URL: www.infosec.it

Language: English - Date: 2008-06-01 17:57:57
694Labour relations / Business ethics / Employment / Computer law / Ireland / Accounting Technicians Ireland / Computer security

Regulations, Policies and Procedures General Policy G01 Code of Conduct 1.

Add to Reading List

Source URL: belgrade.sae.edu

Language: English - Date: 2013-09-06 04:59:08
695Identity management systems / Self-service password reset / Password policy / Password / Security / Computer security

Creating a Unique Student Identifier (USI) Information You are able to create your Unique Student Identifier (USI) online. Before you begin you will need to know your personal details and have an Identification document

Add to Reading List

Source URL: ccg.asn.au

Language: English - Date: 2014-11-19 21:09:41
696Mobile computers / Mobile phones / Content management systems / Computer security / Mobile device management / Bring your own device / Records management / .mobi / Information security / Security / Technology / National security

Microsoft Word - Mobile_Tech_Policy.docx

Add to Reading List

Source URL: prov.vic.gov.au

Language: English - Date: 2014-10-12 23:06:41
697Computing / Cookie / Login / Session / Computer security / Security / Zombie cookie / Evercookie / Internet privacy / HTTP / HTTP cookie

Planet Festival Cookie Policy Planet Festival uses cookies to remember your preferences when browsing our website. We also use cookies to allow you to make your travel booking or other purchases. We understand that makin

Add to Reading List

Source URL: www.planetfestival.co.uk

Language: English - Date: 2014-01-13 07:48:05
698Computer security / Cyberwarfare / Passphrase / Lorrie Cranor / Password policy / Password cracking / Cryptography / Security / Password

Creating Usable Policies for Stronger Passwords with MTurk Richard Shay February 2015 CMU-ISR[removed]Institute for Software Research

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-03-02 16:44:46
699Security / Data security / Computer law / Confidentiality / Data Protection Act / Medical privacy / Backup / Information privacy / Information security / Privacy / Ethics / Data privacy

Microsoft Word - Policy Document Jan 2008.doc

Add to Reading List

Source URL: www.qub.ac.uk

Language: English - Date: 2013-06-26 07:59:44
700Companies listed on the New York Stock Exchange / Hacking / Computing / Vulnerability / Host Based Security System / Computer security / McAfee / Cyberwarfare

Supplier Security Requirements & Expectations for Web Applications: Externally Facing Data McAfee Effective Date: October 2011 Modified Date: August 2013 Policy Owner: Global Security Services

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:55:25
UPDATE