Computer security policy

Results: 3514



#Item
871Cryptography / Identity management / Password strength / Password cracking / Security / Password / Computer security

Microsoft Word - Password Policy August 2014

Add to Reading List

Source URL: www.wgmb.net.au

Language: English - Date: 2014-08-13 20:18:59
872National security / National Counterterrorism Center / United States Department of Homeland Security / Computer security / Security / Public safety / Counter-terrorism

Bill Wright Director, Cybersecurity Partnerships Symantec Corporation Bill Wright is the Director of Cybersecurity Partnerships. He brings nearly 20 years of experience spanning the legal, policy, and operational spectru

Add to Reading List

Source URL: www.polcyb.org

Language: English - Date: 2013-04-05 01:46:49
873Security / Law / Business law / Cryptography / Trusted Computing / Digital rights management / Ring / Security policy / Virtual private network / Computer security / Computer network security / Copyright law

Managing Multiple Perspectives on Trust Clifford Neuman Director, USC Center for Computer Systems Security

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2009-01-21 12:12:04
874Computing / Symantec / Information security / Payment Card Industry Data Security Standard / Security controls / ISO/IEC 27001 / Vulnerability / Norton Internet Security / Norton 360 / Computer security / Data security / Security

Customer-Facing Information Security Policy Global Security Office (GSO) Version 2.6 Last Updated: [removed]

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2015-03-23 12:56:13
875Cyberwarfare / Geneva Centre for Security Policy / Peace / Vulnerability / Computer security / Security / Hacking

TRAINING COURSE[removed]MARCH 2015 © Fotolia

Add to Reading List

Source URL: www.gcsp.ch

Language: English
876Access control / Cryptographic software / Password strength / Password policy / Password / Security / Computer security

Password Key 4.1 Copyright ©2003, Carl Powell III / AlaTec Associates Instructions For Mac OS X Password Key has been helping users to control access to their computers for over 10 years. Each time we have upgraded Pass

Add to Reading List

Source URL: www.alatec.com

Language: English - Date: 2010-02-07 13:46:25
877Spamming / Computer-mediated communication / Computer security / Data security / Internet ethics / Internet privacy / Information security / Acceptable use policy / Password / Email / Computing / Internet

ISMS-ISPS-003 PUBLIC Acceptable Usage Standard Version: 1.0

Add to Reading List

Source URL: www6.cityu.edu.hk

Language: English - Date: 2013-12-19 03:57:49
878Crime prevention / Public safety / Computer security / Information security / ISO/IEC 27001 / Privacy / Government of South Australia / Security Policy Framework / Security / Data security / National security

SA NT DataLink Security Manual -Overview Organisation: University of South Australia Unit: SA NT DataLink

Add to Reading List

Source URL: www.santdatalink.org.au

Language: English
879Cleanfeed / Computer network security / Content-control software / Internet Watch Foundation / Computing / Censorship / Internet / Deep packet inspection / Content filtering / Censorship in the United Kingdom / Internet governance / Censorship in Canada

International Internet Filtering Frameworks Alana Maurushat Faculty of Law, Cyberspace Law & Policy Centre, UNSW versus

Add to Reading List

Source URL: www.bakercyberlawcentre.org

Language: English - Date: 2009-03-31 21:23:07
880Information Risk Management / Public safety / Auditing / Data security / Information assurance / Security Policy Framework / Assurance services / Information security / Audit / Security / Computer security / National security

SAMPLE TEMPLATE SUPPLIER ASSURANCE FRAMEWORK LETTER TO SUPPLIER - INVITE TO COMPLETE THE STATEMENT OF ASSURANCE

Add to Reading List

Source URL: www.gov.uk

Language: English - Date: 2015-02-25 10:58:10
UPDATE