Computer security policy

Results: 3514



#Item
901Computer network security / Wireless / Wireless security / Wireless LAN / Wireless access point / Computer network / Wi-Fi / Cracking of wireless networks / Wireless networking / Technology / Electronic engineering

Microsoft Word - Appendix 3F(iii) Wireless Data Communications Policy.DOC

Add to Reading List

Source URL: www.partnershipsbc.ca

Language: English - Date: 2015-03-25 20:40:37
902Public safety / Cyberwarfare / Security engineering / Critical infrastructure protection / Infrastructure / Computer security / National Cyber Security Division / Cyber-security regulation / National security / United States Department of Homeland Security / Security

DCAF Young Faces 2014 – Cybersecurity Winter School for the Western Balkans PUBLIC POLICY TOOLS TO PROMOTE CYBERSECURITY FOR CRITICAL INFRASTRUCTURE PROTECTION AUTHOR: Sergiu CONOVALU*

Add to Reading List

Source URL: www.dcaf.ch

Language: English
903Public safety / Data security / Cyberwarfare / National Cyber Security Division / Information security / Vulnerability / United States Department of Homeland Security / Cyber-security regulation / Institute for Information Infrastructure Protection / Computer security / Security / Hacking

Private Sector Cyber Security Investment Strategies: An Empirical Analysis* Brent R. Rowe Technology Economics and Policy RTI International

Add to Reading List

Source URL: weis2006.econinfosec.org

Language: English - Date: 2006-07-20 16:57:22
904Security / Privacy / Computer law / Data Protection Directive / European Union / Information privacy / Information security / Personally identifiable information / Government procurement in the United States / Data privacy / Privacy law / Law

Corporate Policy. Data Protection for Data of Customers & Partners. 02 Preamble

Add to Reading List

Source URL: www.mbbrisbane.com.au

Language: English - Date: 2015-04-18 20:03:18
905Public safety / Computer network security / Crime prevention / SANS Institute / Information security / Security controls / Mobile device / Corporate security / Security / Computer security / Data security

Security Policy for the use of handheld devices in corporate environments

Add to Reading List

Source URL: www.getadvanced.net

Language: English - Date: 2013-06-12 11:13:30
906Security / Electronic commerce / Embedded system / Vulnerability / Firewall / Application firewall / Database / Cross-site scripting / Ambient intelligence / Cyberwarfare / Computer security / Computer network security

Abstracting application-level security policy for ubiquitous computing

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2005-01-07 10:37:24
907Internet / Technology / Acceptable use policy / Computer security / Etiquette / Internet culture / M86 Security / Anti-spam techniques / Malware / Email / Computing / Spamming

White Paper Is Your Acceptable Use Policy Social Media-proof? ABSTRACT This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and

Add to Reading List

Source URL: viewer.media.bitpipe.com

Language: English - Date: 2011-02-11 11:04:13
908Crime prevention / Data security / Information security / National security / Employment / Conflict of interest / Contract / Privacy policy / Government / Law / Security / Computer security

CODE OF CONDUCT This Code of Conduct sets standards of behaviour for how you should act and behave as an employee, contractor or director of SKILLED. The Code reflects SKILLED’s core values. SKILLED is committed to the

Add to Reading List

Source URL: www.skilled.com.au

Language: English - Date: 2014-11-09 21:19:56
909Cryptography / Password / Cryptographic software / Roboform / Password policy / LastPass Password Manager / Password strength / Security / Computer security / Access control

Tip Sheet Creating strong, safe passwords Ensuring the security of multiple online accounts might seem like a big task, but it’s really important you don’t use the same password for everything. Data breaches of well

Add to Reading List

Source URL: www.accan.org.au

Language: English - Date: 2015-03-05 20:32:56
910Password / Password policy / Identity management systems / Password manager / Security / Cryptography / Computer security

Secure passwords Video Transcript Often, there is really only one thing standing between your sensitive information and criminals - your password. If they get it, they can get into banks accounts and private files, and w

Add to Reading List

Source URL: www.forwardit.sa.gov.au

Language: English - Date: 2011-10-10 02:41:25
UPDATE