Computer security

Results: 47159



#Item
281Health / Medicine / Medical technology / Medical equipment / Health informatics / Biological engineering / Biomedical engineering / Medical device / Computer security / Food and Drug Administration / Medical equipment management / Patient safety organization

MDISS Medical Device Innovation, Safety, & Security Consortium BUILDING SOLUTIONS THROUGH COLLABORATION TO REDUCE RISK IN THE U.S. BIOMEDICAL DEVICE NETWORK.

Add to Reading List

Source URL: www.mdiss.org

Language: English - Date: 2014-06-11 12:56:44
282Security / Technology / Professional mobile radio / PMR / Computer security / Smart grid

Flyer_Vorankünd_engl_Online.pdf

Add to Reading List

Source URL: www.pmrexpo.de

Language: English
283Computer network security / Computing / Security / Videotelephony / Cyberwarfare / Internet privacy / Network architecture / Secure communication / Videoconferencing / Virtual private network / Endpoint / Computer security

NARBHAnet Documentation of Security Measures for Clinical Videoconferencing Connections This form is required as written documentation that security measures are in place for all videoconference endpoints and connections

Add to Reading List

Source URL: www.rbha.net

Language: English - Date: 2013-04-11 02:24:06
284Prevention / Safety / Probability / Risk / Actuarial science / Security / Disaster preparedness / Humanitarian aid / Risk management / Vulnerability assessment / Social vulnerability / Disaster risk reduction

Lecture Notes in Computer Science:

Add to Reading List

Source URL: www.codata-germany.org

Language: English - Date: 2014-06-10 04:40:56
285Software / Computer access control / System software / Password / Security / Switch / Su / Identity management systems

CSUCI > Pharos Quick Reference Guide

Add to Reading List

Source URL: www.csuci.edu

Language: English - Date: 2015-03-18 16:52:07
286Security / Prevention / Cyberwarfare / Cybercrime / National security / Safety / Computer security / Cyber-security regulation / Politics and technology / International Federation for Information Processing / Cyber / Lecture Notes in Computer Science

TYLER MOORE Tandy Assistant Professor of Cyber Security and Information Assurance University of Tulsa, Tulsa, OKemail: http://tylermoore.ens.utulsa.edu/ tel: +

Add to Reading List

Source URL: tylermoore.ens.utulsa.edu

Language: English - Date: 2016-03-24 11:13:01
287Computing / Software / Computer architecture / Smartphones / Android / Mobile security / Qualcomm / Rooting / BlackBerry Priv / Computer security / Linux kernel / Privilege escalation

QUADROOTER NEW VULNERABILITIES AFFECTING OVER 900 MILLION ANDROID DEVICES by the Check Point Research Team INTRODUCTION The cloak-and-dagger of cybercrime makes for entertaining theater.

Add to Reading List

Source URL: www.checkpoint.com

Language: English - Date: 2016-08-05 12:48:52
288Software / System software / Computing / Arxan Technologies / Antivirus software / Cyberwarfare / Mobile security / Android / Computer security / Avira / Malware / Anti-tamper software

Arxan Best Practices White Paper Effective Mobile Application Security Strategies TABLE OF CONTENTS

Add to Reading List

Source URL: www.arxan.com

Language: English - Date: 2016-08-01 23:53:33
289Security / Computing / Law enforcement / Prevention / Symbol / Cyber-physical system / Computer security / Information flow

Enforcing Information Flow Security Properties in Cyber-Physical Systems: A Generalized Framework Based on Compensation

Add to Reading List

Source URL: cs.mst.edu

Language: English - Date: 2015-04-03 16:07:48
290Security / Prevention / Safety / Computer security / Cryptography / Data security / Information security / National security / Computer network / Access control / Internet privacy

Microsoft Word - MRN Collaborator Handbook

Add to Reading List

Source URL: www.mrn.org

Language: English - Date: 2015-04-24 17:58:58
UPDATE