Computer security policy

Results: 3514



#Item
821Ethernet / Computer architecture / Network topology / Network protocols / Middlebox / Local area networks / Firewall / Network switch / Virtual LAN / Computer network security / Computing / Network architecture

A Policy-aware Switching Layer for Data Centers Dilip Antony Joseph Arsalan Tavakoli Ion Stoica

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2008-06-24 12:47:07
822Backup software / Backup / Data synchronization / Computer data / Incremental backup / RMAN / Data loss / Remote backup service / Handy Backup / Computing / Data security / Software

UNSW Policy - Insert Title Here

Add to Reading List

Source URL: icts.unsw.adfa.edu.au

Language: English - Date: 2010-04-08 20:50:49
823Computer security / Electronic commerce / Public key certificate / European Telecommunications Standards Institute / Service provider / Certificate policy / Electronic signature / Information security / Digital signature / Cryptography / Key management / Public-key cryptography

Final draft ETSI EN[removed]V1[removed]European Standard

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2012-11-08 09:35:32
824Spamming / Lorrie Cranor / Crime / Ethics / Criminology / Social engineering / Computer crimes / Phishing

11 – Security Warnings Engineering & Public Policy

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-03-03 17:54:25
825Computer law / Law / Privacy / Data management / Data Protection Act / Information security / Fellow / Information privacy / Database / Data privacy / Privacy law / Security

CSC[removed]version) ALL SOULS COLLEGE OXFORD POLICY AND PROCEDURES ON DATA PROTECTION Introduction and Scope

Add to Reading List

Source URL: www.asc.ox.ac.uk

Language: English - Date: 2013-07-05 05:29:36
826Password / Passphrase / Dictionary attack / Crypt / Crack / Key derivation function / Password policy / Password manager / Cryptography / Computer security / Security

Joint Universities Computer Centre Limited (“JUCC”) Information Security Awareness Training - Session Two End User Security, IS Control Evaluation & Self- Assessment Password Management

Add to Reading List

Source URL: www.istf.jucc.edu.hk

Language: English - Date: 2011-11-23 20:45:53
827Crime prevention / National security / Cryptographic software / Computing / Computer security / Electronic commerce / Attacker / TrueCrypt / Lorrie Cranor / Software / Security / Computer network security

02- Introduction to Security / Usable Encryption Engineering & Public Policy

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-03-03 17:53:52
828Cryptography / Password / One-time password / Passphrase / Password strength / Password manager / Security / Computer security / Access control

THE FIJI GOVERNMENT PASSWORD POLICY Version[removed] DOCUMENT APPROVAL

Add to Reading List

Source URL: www.itc.gov.fj

Language: English - Date: 2012-04-27 12:44:52
829Computing / Crime prevention / National security / Computer network security / Social issues / Internet privacy / Personally identifiable information / Password / Information privacy / Ethics / Privacy / Security

SoftWare Assurance MarketPlace (SWAMP) Privacy Policy Intended Distribution: Public Version 1 January 13, 2014 The SoftWare Assurance MarketPlace (SWAMP) network and Continuousassurance.org

Add to Reading List

Source URL: continuousassurance.org

Language: English - Date: 2014-09-16 14:59:55
830Technology / Password / Internet privacy / Acceptable use policy / Internet / Operating system / Information security / Password strength / Computer security / Digital media / Computing

Reviewed[removed]INFORMATION MANAGEMENT GUIDE RULES FOR THE USE OF THE UNIVERSITY S IT FACILITIES ( The Rules )

Add to Reading List

Source URL: www.uclan.ac.uk

Language: English - Date: 2015-03-31 09:36:18
UPDATE