Computer security policy

Results: 3514



#Item
771Computer network security / Crime prevention / National security / Data security / Information security / Access control / Security controls / Password / Authentication / Security / Computer security / Public safety

Information Security Policy - Companion Document

Add to Reading List

Source URL: www.it.unsw.edu.au

Language: English - Date: 2010-04-07 20:19:51
772Malware / System software / Spyware / Computer security / Spamming / Trojan horse / Computer worm / Botnet / Rootkit / Cyberwarfare / Espionage / Computer network security

Malware, Informally Malware Categorisation in Support of Malware Policy Analysis Roger Clarke •

Add to Reading List

Source URL: www.rogerclarke.com

Language: English - Date: 2013-03-23 07:51:38
773Java / Application programming interface / Computer security / Computing / Java programming language / Windows API

Policy-Directed Code Safety by David E. Evans S.B. Massachusetts Institute of Technology[removed]S.M. Massachusetts Institute of Technology (1994)

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 1999-11-11 08:42:34
774Computer security / Windows Vista / Windows XP / Privilege / Principle of least privilege / Superuser / Windows Installer / Mandatory Integrity Control / Group Policy / Microsoft Windows / System software / Software

BeyondTrust® Privilege Manager BeyondTrust empowers IT to eliminate the risk of intentional, accidental and indirect “Once inside a company’s environment, access to various areas should be restricted based on busine

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2010-09-08 23:23:55
775Computing / Identity management / Social issues / Internet ethics / National security / Internet privacy / Personally identifiable information / Information privacy / Computer security / Ethics / Security / Privacy

FiscalNote Privacy & Security Policy 1. General 1.1. FiscalNote, Inc. (“FiscalNote”) respects your online privacy and security and protects information that you decide to share with us, in an appropriate and reasonab

Add to Reading List

Source URL: www.fiscalnote.com

Language: English - Date: 2015-04-09 18:49:18
776Management / Computer security / Data security / Business ethics / Information security / Internal control / Regulatory compliance / Corporate governance / Emergency management / Security / Risk / Business

Risk Management and Compliance The ANA Group has established a basic policy on internal control systems in accordance with the Companies Act of Japan. To strengthen and promote corporate governance, the ANA Group is imp

Add to Reading List

Source URL: www.anahd.co.jp

Language: English - Date: 2014-09-17 21:35:03
777National Information Assurance Partnership / Evaluation Assurance Level / Protection Profile / Validation / Thought / Knowledge / Common Criteria / Evaluation / Common Criteria Evaluation and Validation Scheme / Computer security

As related to CCEVS Policy Letter #12, Letter of Intent for CCEVS Evaluation, the CCEVS is requesting answers to the following

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
778Password / Identity management systems / Password policy / Comparison of privilege authorization features / Computer security / Security / Access control

MEET WINDOWS Installation DOWNLOAD & SHOP Search & touch

Add to Reading List

Source URL: www.moh.gov.my

Language: English - Date: 2013-12-13 02:10:04
779Email / Spamming / Computer security / DMARC / DomainKeys Identified Mail / Phishing / Sender Policy Framework / Gmail / Spam filtering / Email authentication / Computing

DMARC Continuing to enable trust between brand owners and receivers February

Add to Reading List

Source URL: dmarc.org

Language: English - Date: 2014-02-16 17:00:21
780National security / Data security / Computer security / Computer network security / Information security / Security guard / Policy / Security / Crime prevention / Public safety

Enforcing Information Security Policies in the Higher Education Community David G Swartz, PhD Co-chair Higher Education Information Security Council Educause and Internet2

Add to Reading List

Source URL: www.istf.jucc.edu.hk

Language: English - Date: 2011-02-24 03:43:54
UPDATE