Computer security

Results: 47159



#Item
171Computing / Computer security / Eduroam / Sophos / Cloud computing / University of California /  Santa Barbara / Software

April 15, 2016 To: UCSB IT Leaders From: Matthew Hall, Associate Vice Chancellor for Information Technology & Chief Information Officer Re:

Add to Reading List

Source URL: cio.ucsb.edu

Language: English
172Security / Prevention / Safety / Identity management / Cryptography / Computer security / National security / Password / Access control / Information security / Identity management system / Su

PDF Document

Add to Reading List

Source URL: its.sjsu.edu

Language: English - Date: 2015-12-07 11:37:15
173Ethernet / IEEE standards / Networking hardware / Computing / Network switch / Engineering / Computer hardware / Dell Networking / Fibre to the office

REACH ANYWHERE WITHOUT THE EXCESS SIMPLIFY YOUR SECURITY NETWORK WITH OPTIGO NETWORKING SOLUTIONS FOR SECURITY

Add to Reading List

Source URL: www.optigo.net

Language: English - Date: 2015-10-05 17:30:08
174Computing / Computer access control / Security / Microsoft / Form / Login / Email / Password / Computer security / Registered user / Outlook.com

BVP Account Creation Checklist

Add to Reading List

Source URL: ojp.gov

Language: English - Date: 2016-03-04 16:05:26
175Business / Economy / Computer security / Antivirus software / American brands / Cylance Inc. / Symantec / Sales / Channel partner / Dell / Sophos

CYLANCE CHANNEL PROGRAM ® Partner with the Fastest-Growing Company in Cybersecurity

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2016-06-17 12:40:34
176Security / Computer security / Access control / Computer access control / Identity management / XACML / Authorization / Privacy / Information visualization / Internet privacy / Situation awareness

Information Visualization for Rule-based Resource Access Control Jaime Montemayor, Andrew Freeman, John Gersh, Thomas Llanso, Dennis Patrone The Johns Hopkins University Applied Physics LaboratoryJohns Hopkins Roa

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-06-02 15:04:21
177Security / Computer security / Cybercrime / Computer access control / Point and click / Login / Click

How to Login to Faculty Web Go to the Graduate Center Home Page: www.gc.cuny.edu and click on the Portal link Click here Click on the Self Service Banner link to access the login page:

Add to Reading List

Source URL: www.gc.cuny.edu

Language: English - Date: 2014-12-03 11:02:15
178Computer security / Software / Computing / Computer access control / Xerox DocuShare / Access control / Group / Document collaboration / Access control list / Shared resource / File system permissions / Outlook.com

How Users Use Access Control D. K. Smetters Nathan Good PARC

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-05-30 23:35:56
179Software / Computer security / Antivirus software / System software / Malwarebytes / Malware / Intel Security / Ransomware / Avira / Marcin Kleczynski / IObit

C A S E S T U DY University of Central Lancashire masters malware The University protects its mobile workforce with Malwarebytes Business profile

Add to Reading List

Source URL: pt.malwarebytes.com

Language: English - Date: 2016-07-07 18:41:23
180Computer storage devices / Computer data storage / Computer hardware / Computer storage media / Information science / Non-volatile memory / Video surveillance / Security / Video management system / NVR / IP camera / Hard disk drive

Expert In Protecting Your Interests M6 Rackmount Enterprise NVR Series As GVD’s Enterprise NVRs, the M6 Series

Add to Reading List

Source URL: www.gvdigital.com

Language: English - Date: 2016-06-19 23:56:05
UPDATE