Computer security policy

Results: 3514



#Item
701Windows NT / Rapid7 / Computer network security / Metasploit Project / Windows Server / Microsoft Windows / Windows Vista / Windows / Software / System software / Computer security

Microsoft Word - Rapid7 End of Life Policy - v7.docx

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2015-02-04 12:01:39
702Email / Etiquette / Internet / Internet culture / Internet privacy / Privacy / Computing / Ethics / Acceptable use policy / Computer security

      This acceptable use policy sets out the terms between you and us under which you may access our website http://www.sohonet.com (our site). This acceptable use policy applies to all users of, and visitors t

Add to Reading List

Source URL: www.sohonet.com

Language: English - Date: 2014-07-07 10:24:14
703Business / Data security / Information technology audit / Regulatory compliance / Computer security / Business ethics / Ethical code / Compliance and ethics program / Investment Policy Statement / Ethics / Auditing / Applied ethics

2010 CODE OF ETHICS & STANDARDS OF PROFESSIONAL CONDUCT This Code of Ethics & Standards of Professional Conduct sets out the principles and standards of

Add to Reading List

Source URL: www.imas.org.sg

Language: English - Date: 2012-11-02 05:07:15
704Etiquette / Internet / Internet culture / Computing / Real estate broker / Email spam / Property / Estate agent / Business / Email / Acceptable use policy / Computer security

RC-Logo_Tagline_Horizontal_Positive_Colour_CMYK

Add to Reading List

Source URL: agent.realcommercial.com.au

Language: English - Date: 2014-12-02 20:29:13
705Data security / Email / Password / Hacker / Social engineering / Internet privacy / Information security / Hacking: The Art of Exploitation Second Edition / Password policy / Computing / Hacking / Computer security

COMPUTER SECURITY 261 SOCIAL HACKING (ALSO KNOWN AS SOCIAL ENGINEERING)

Add to Reading List

Source URL: www.privacytactics.com

Language: English - Date: 2012-08-13 12:49:14
706Privacy of telecommunications / Computer law / Privacy law / Human rights / Cyberspace / Legal aspects of computing / Telecommunications data retention / Patriot Act / Internet privacy / Ethics / Law / National security

Uberveillance Ubiquitous online surveillance and computer science – ethical and legal issues David Vaile Co-convenor, Cyberspace Law and Policy Community

Add to Reading List

Source URL: www.cyberlawcentre.org

Language: English - Date: 2014-09-08 12:40:30
707Password strength / Password / Randomness / John the Ripper / Entropy / Password policy / OTPW / Cryptography / Security / Computer security

Of Passwords and People: Measuring the Effect of Password-Composition Policies Saranga Komanduri1 , Richard Shay1 , Patrick Gage Kelley1 , Michelle L. Mazurek1 , Lujo Bauer1 , Nicolas Christin1 , Lorrie Faith Cranor1 , a

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2012-07-19 22:34:09
708Computer law / Computer network security / Acceptable use policy / Internet privacy / Spam / Denial-of-service attack / IO Group /  Inc. v. Veoh Networks /  Inc. / Data discrimination / Internet / Computing / Email

PDF Document

Add to Reading List

Source URL: www.fibersphere.com

Language: English - Date: 2011-08-03 15:52:21
709Network architecture / Firewall / Network switch / Load balancing / Distributed firewall / Virtual LAN / Deep packet inspection / Computer network security / Computing / Middlebox

A Policy-aware Switching Layer for Data Centers Dilip A. Joseph [removed] Arsalan Tavakoli [removed]

Add to Reading List

Source URL: ccr.sigcomm.org

Language: English - Date: 2008-07-23 12:32:55
710Cyberterrorism / Hacking / Security / Crime / Electronic warfare / Military technology / Internet-related prefixes / Computer security / Computer crimes / Cyberwarfare / Terrorism

Collegium Civitas Foreign Policy of the United States of America how to prevent and fight international and domestic

Add to Reading List

Source URL: honey.7thguard.net

Language: English - Date: 2012-02-16 18:34:55
UPDATE