Computer security

Results: 47159



#Item
361Computing / Computer network security / Prevention / Security / Data management / Cryptography / National security / Background check / DMZ / Computer security / Internet privacy / Criminal record

Confidentiality and Legal Issues of Employee Screening

Add to Reading List

Source URL: www.integratedscreening.com

Language: English - Date: 2014-02-14 11:28:14
362Computing / Technology / Humancomputer interaction / Usability / Technical communication / Software / Design / Graphic design / User interface design / User interface / End user / Computer security

Three Challenges for Embedding Security into Applications Rebecca E. Grinter and D. K. Smetters Palo Alto Research Center (PARCCoyote Hill Road Palo Alto, CAUSA

Add to Reading List

Source URL: www.andrewpatrick.ca

Language: English - Date: 2003-01-17 16:30:14
363Engineering / Computing / Security engineering / Robert C. Seacord / Secure coding / Computer programming / Vulnerability / Security Patterns / Software engineering / Cyberwarfare / Software development / Grady Booch

Microsoft Word - review18.doc

Add to Reading List

Source URL: www.jot.fm

Language: English - Date: 2007-08-10 10:58:07
364Computer architecture / Computing / Software / Smartphones / Password / Security / Android / Nevis Historical and Conservation Society / Chrome OS / Pass

NHCS – Bring Your Own Device Instructions Android Phone Screenshots taken using AndroidStep 1) Go to Settings, then Select Wi-Fi New Hanover County Schools

Add to Reading List

Source URL: www.nhcs.net

Language: English - Date: 2016-05-11 08:37:52
365Computer access control / Exonumia / Token coin / IP address / Anonymous remailer / One-time password / Computer security / Access control / Computing

Do You Believe in Tinker Bell? The Social Externalities of Trust Khaled Baqer and Ross Anderson Computer Laboratory, University of Cambridge, UK

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2016-02-02 10:23:17
366Security / Prevention / Computer security / Crime prevention / Cryptography / Information governance / National security / Information security / FIPS 140-2 / Consultant / Professional certification / Common Criteria

Introducing atsec information security Chief Executive Officer, Director of Strategy and Business Devlopment Who are we?

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 03:59:12
367Prevention / Computer security / Safety / Security / Data security / Cryptography / Information security / National security / Regulatory compliance

-Montana Operations Manual STANDARD TEMPLATE Category

Add to Reading List

Source URL: sitsd.mt.gov

Language: English - Date: 2016-04-18 15:42:36
368Security / Cyberwarfare / Computer network security / Computer security / Cryptography / National security / Secure communication / San Bernadino / Foresight

Jarrod Burguan, Chief of Police City of San Bernadino "Rapidly-evolving digital technology presents law enforcement with new and difficult challenges that we must be able to overcome. As the tragic attack in my hometown

Add to Reading List

Source URL: homeland.house.gov

Language: English - Date: 2016-03-16 10:19:05
369Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Computer virus / Avira / Ransomware / Marcin Kleczynski / IObit

C A S E S T U DY City of Memphis gives malware the blues Malwarebytes puts distance between advanced threats and city endpoints Business profile

Add to Reading List

Source URL: br.malwarebytes.com

Language: English - Date: 2016-07-07 18:30:53
370Security / Computer security / Prevention / Cybercrime / Identity documents / Identity theft / Computer network security / Secure communication / Password / Internet privacy / Spyware / Phishing

Terms and Conditions governing the ‘3-Month FREE iOCBC ChartSense Promotion’

Add to Reading List

Source URL: portal.iocbc.com

Language: English - Date: 2013-09-18 02:18:48
UPDATE