Computer security

Results: 47159



#Item
141

A Security Model for Full-Text File System Search in Multi-User Environments Stefan B¨uttcher and Charles L. A. Clarke School of Computer Science University of Waterloo Waterloo, Ontario, Canada

Add to Reading List

Source URL: plg.uwaterloo.ca

- Date: 2005-08-29 19:39:57
    142

    HD P2P IP Camera Quick Installation Guide B. View with Internet Explorer (1) Open CD with computer; find and run “search tool”; (2) Search tool can find camera IP address and port number; you can also use it to modif

    Add to Reading List

    Source URL: www.lowcost-security.ch

    - Date: 2015-02-11 08:54:31
      143

      Two Visual Computer Network Security Monitoring Tools Incorporating Operator Interface Requirements William Yurcik James Barlow* Kiran Lakkaraju Mike Haberman National Center for Supercomputing Applications (NCSA) Univer

      Add to Reading List

      Source URL: www.andrewpatrick.ca

      - Date: 2003-02-12 07:18:34
        144

        Investigating the Computer Security Practices and Needs of Journalists Susan E. McGregor, Columbia Journalism School; Polina Charters, Tobin Holliday, and Franziska Roesner, University of Washington https://www.usenix.or

        Add to Reading List

        Source URL: www.usenix.org

        - Date: 2016-02-22 01:46:49
          145

          COMPUTER SYSTEM SECURITY AND

          Add to Reading List

          Source URL: csrc.nist.gov

          - Date: 2015-03-12 09:20:41
            146

            Roseann Guttierrez is a Senior Security Analyst that works to protect the Texas Electric Grid. Her primary responsibilities are IDS/IPS, Computer Forensics, and Incident Response. Creating Incident Response scenarios, se

            Add to Reading List

            Source URL: www.htcia.org

            - Date: 2015-08-26 18:13:17
              147

              ITL BULLETIN FOR JULY 2016 IMPROVING SECURITY AND SOFTWARE MANAGEMENT THROUGH THE USE OF SWID TAGS David Waltermire, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory

              Add to Reading List

              Source URL: csrc.nist.gov

              - Date: 2016-08-23 14:55:14
                148

                PROPOSED POLICY P02Mobile Device Security Policy University employees and students who use a laptop computer or mobile device (e.g. portable hard drives, USB flash drives, smartphones, tablets) are responsibl

                Add to Reading List

                Source URL: alaska.edu

                - Date: 2015-02-18 18:41:14
                  149

                  Sixth Annual Conference on Privacy, Security and Trust A Protocol for Building Secure and Reliable Covert Channel Baishakhi Ray University Of Colorado, Boulder Department Of Computer Science

                  Add to Reading List

                  Source URL: rayb.info

                  - Date: 2016-08-19 22:20:15
                    UPDATE