Computer security policy

Results: 3514



#Item
751Cyberwarfare / Password / Fear appeals / Crypt / Password policy / Security / Cryptography / Computer security

How Interactivity Can Enhance the Effectiveness of Fear Appeals: A Web-based Field Experiment of Password Security Anthony Vance, David Eargle, Kirk Ouimet Brigham Young University Detmar Straub Georgia State University

Add to Reading List

Source URL: www.kirkouimet.com

Language: English - Date: 2013-04-02 01:59:02
752Occupational safety and health / Victorian Workcover Authority / Safety Management Systems / WorkSafe Victoria / Near miss / Health and Safety at Work etc. Act / Emergency / Computer security incident management / Safety / Security / Prevention

OHS Incident, Injury, Hazard Reporting and Investigation Procedure (MPF1206) GOVERNING POLICY This procedure has been made under the Occupational Health and Safety Policy. SCOPE

Add to Reading List

Source URL: policy.unimelb.edu.au

Language: English
753Information security / Public safety / Prevention / Security / Computer security / Sophos

Mansfield College Information Security Policy Guidance Notes 1 INTRODUCTION These notes are intended to offer specific guidance to interpreting sections of the Mansfield College Information Security Policy. They highligh

Add to Reading List

Source URL: www.mansfield.ox.ac.uk

Language: English - Date: 2014-07-07 08:03:39
754Computer security / Access control / Identity management / Parking / Security guard / Key / Burglar alarm / Security / Public safety / Crime prevention

Operation of University Property Procedure (MPF1117) GOVERNING POLICY This procedure is made under the Management of University Property Policy. SCOPE This procedure applies to the operation and use of University buildin

Add to Reading List

Source URL: policy.unimelb.edu.au

Language: English
755Computer security / Password manager / Password policy / Password / Access control / Security

Bournemouth Borough Council Online Portal Self Service User Guide ‐ Business Rates Go to the login screen at www.bournemouth.gov.uk/openaccess The portal will allow you to view your records online. This service will no

Add to Reading List

Source URL: www.bournemouth.gov.uk

Language: English - Date: 2015-03-03 10:09:34
756Occupational safety and health / Public safety / Management / Computer security / Safety / Data security / Disaster preparedness / Emergency management / Humanitarian aid

International Student Critical Incident Procedure (MPF1239) GOVERNING POLICY This procedure is made under the Student Support and Engagement Policy. SCOPE The procedure applies to all international students enrolled at t

Add to Reading List

Source URL: policy.unimelb.edu.au

Language: English
757Antivirus software / Cyberwarfare / Computer virus / Computer worm / Computer security / Kaspersky Anti-Virus / Macro virus / System software / Computer network security / Malware

Computer Use Regulations: Anti-Virus Policy August 2010 The University’s Computer Use Regulations comprise a series of policies/guidance on a range of topics – such as this one – to provide staff with simple, acces

Add to Reading List

Source URL: www.port.ac.uk

Language: English - Date: 2015-04-15 11:20:37
758Public safety / Cisco Systems / Deep packet inspection / Videotelephony / Computing / Information security / Computer security / Security / Crime prevention / National security

Policy Assurance Monitoring for IoE Cisco IT Insights What As Cisco prepares for the proliferation of devices within the concept of the Internet of Everything (IoE), Cisco IT is focusing on implementing backbone technolo

Add to Reading List

Source URL: www.cisco.com

Language: English
759Relational database management systems / Password / Oracle Database / Oracle Corporation / Database audit / Copyright / Computer security / Database security / Password policy / Security / Information technology management / Software

Oracle_Security_Masterclass_WH2008

Add to Reading List

Source URL: www.petefinnigan.com

Language: English - Date: 2008-09-29 13:22:01
760Linux Security Modules / Linux kernel / Fedora / X Window System / Debian / Security-Enhanced Linux / AppArmor / Software / System software / Computer architecture

Introduction Concepts The nuts and bolts Policy syntax Writing an SELinux module Wrap-up

Add to Reading List

Source URL: www.billauer.co.il

Language: English - Date: 2008-12-23 08:38:19
UPDATE