Computer security

Results: 47159



#Item
351Computing / Cryptography / Computer architecture / Computer network security / Shellcode / Data structure alignment / X86 / Kerberos / Transmission Control Protocol

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
352Security / Prevention / Safety / Crime prevention / National security / Public safety / Physical security / Perimeter security / Security guard / Computer security / Access control / Identity document

Introduction to Security Awareness Briefing Office of Security @ NOAA

Add to Reading List

Source URL: osec.doc.gov

Language: English - Date: 2012-02-22 10:48:16
353Computer access control / Computer security / Identity management / Identity / Federated identity / Security Assertion Markup Language / Authentication / Identity provider / Best practice / Identity assurance

30-NovMilestone MNA3.1: Recommendations on Minimal Assurance Level Relevant for Low-risk Research Use Cases

Add to Reading List

Source URL: aarc-project.eu

Language: English - Date: 2016-07-21 05:59:15
354Computing / Software / Computer access control / Prevention / Password / Security / Form / Portable Document Format / Login

Applicant Tutorial Foundant Grant Lifecycle Manager Overview This document is designed to provide grant applicants instructions for use of the Foundant Grant Lifecycle Manager application on The Kinsman Foundation websit

Add to Reading List

Source URL: kinsmanfoundation.org

Language: English - Date: 2011-07-24 21:14:23
355Computing / Computer network security / Computer security / Data security / Cyberwarfare / Firewall / Network management / Software / Transmission Control Protocol / Stateful firewall / Network address translation

Managed Security Service – Change Request Form (to be completed by customer) Explanation Notes: ALL sections must be completed and an authorizing Signature included on the SR Cover Application Form. 1-Net cannot

Add to Reading List

Source URL: 1-net.com.sg

Language: English - Date: 2015-12-30 21:07:38
356Electromagnetism / Engineering / Electronic engineering / Electronics manufacturing / Electronic design / Emotions / Hope / Positive mental attitude / Security hacker / Hackers: Heroes of the Computer Revolution / Hacker culture / Printed circuit board

Aal al Beit street, Damascus, Syria. Last day of the presidential election, where there is only one candidate: Bashar al-Assad. Me and Isaam are walking along the crowded sidewalk. We stop at a small kiosk. While standin

Add to Reading List

Source URL: carljohanrosen.com

Language: English - Date: 2014-11-01 13:18:52
357Security / Technology / Information Innovation Office / Computer security / Artificial intelligence

The AAAI-16 Workshop on Artificial Intelligence for Cyber Security (AICS) February 12 or 13, 2016 Phoenix, Arizona, USA Part of the Association for the Advancement of Artificial Intelligence 2016 Conference

Add to Reading List

Source URL: www-bcf.usc.edu

Language: English - Date: 2015-09-12 20:36:52
358Property law / Law / Business law / Economy / Security / Intellectual property law / Bankruptcy / English law / Security interest / Intellectual property / Perfection / Computer security

AIPPI Study Report 2016 – Study Question (General) - Security interests over intellectual property Submission date: 25th April – Study Question (General) by Sarah MATHESON, Reporter General

Add to Reading List

Source URL: aippi.org

Language: English - Date: 2016-05-09 09:04:06
359Computing / Software / Network management / Information technology management / Internet Standards / Internet protocols / System administration / Computer systems / Syslog-ng / Syslog / Balabit / Logfile

syslog-ng Store Box PRODUCT DESCRIPTION CopyrightBalaBit IT Security All rights reserved.

Add to Reading List

Source URL: nextlog.it

Language: English - Date: 2014-05-07 13:40:47
360Freedom of information in the United States / Government / Security / Freedom of Information Act / Freedom of information laws by country / Public records / Internet privacy / FOIA / Computer security / NADDIS / FOIA Oversight and Implementation Act

Privacy and Security Notice “This Air Force ROTC Detachment 205 Website is provided as a public service by the Southern Illinois University. Information presented on the Detachment 205 Website is considered public info

Add to Reading List

Source URL: afrotc.siu.edu

Language: English - Date: 2015-09-28 14:25:30
UPDATE