Computer security

Results: 47159



#Item
401Internet privacy / Computing / Identity documents / Computer security / Cyberspace / HTTP cookie / Privacy / Personally identifiable information / Password / World Wide Web / P3P / Directive on Privacy and Electronic Communications

Peters Bookselling Services Privacy Policy We are committed to safeguarding the privacy of our website visitors; this policy sets out how we will treat your personal information.1 (1)

Add to Reading List

Source URL: www.petranet.co.uk

Language: English - Date: 2016-05-20 09:51:30
402Computing / Evaluation / Relational database management systems / Dependability / Quality / Safety / Security / Database / Association for Computing Machinery / Computer science

Second Workshop on Dependable Distributed Data Management affiliated with EuroSys 2008 Conference March 31, 2008, Glasgow, Scotland http://gorda.di.uminho.pt/wdddm08/ Program Chairs

Add to Reading List

Source URL: gorda.di.uminho.pt

Language: English - Date: 2013-01-28 10:06:19
403Security / Computer security / Cyberwarfare / Computer network security / Web applications / Cryptography / Secure communication / Vulnerability / Web application firewall / Application security / Application firewall

The Increasing Risk to Enterprise Applications Sponsored by Prevoty Independently conducted by Ponemon Institute LLC Publication Date: November 2015

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2016-08-18 22:09:36
404Security / Prevention / Computer security / Human communication / Humancomputer interaction / Identity management / Password / Biometrics / Access control / Password bank / Private biometrics

HCISEC Workshop Proposal 1 HCI and Security Systems Andrew Patrick National Research Council of Canada

Add to Reading List

Source URL: www.andrewpatrick.ca

Language: English - Date: 2002-09-20 12:11:26
405Security / Artificial intelligence / Electronic toll collection / Automatic number plate recognition / Optical character recognition / Road traffic management / Surveillance / Audit / Telecommunications data retention / Computer security

Automated License Plate Reader Audit Review Background Legislation related to law enforcement’s use of automated license plate reader (ALPR) data went into effect inAgencies using ALPRs when the new requirements

Add to Reading List

Source URL: www.ipad.state.mn.us

Language: English - Date: 2016-07-26 08:51:50
406Computing / Software / Technology / Cybercrime / Collections care / Inventory / Museology / Apple Inc. / Computer security / USB / Adobe Flash

CAS  Inventory  –  OCS  System   Apple  Computers  (OSX)   1. If  the  computer  to  be  inventoried  does  not  have  an  active  internet   connection,  

Add to Reading List

Source URL: support.okstate.edu

Language: English - Date: 2014-04-18 17:07:55
407Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Computer virus / Avira / Ransomware / Marcin Kleczynski / IObit

C A S E S T U DY City of Memphis gives malware the blues Malwarebytes puts distance between advanced threats and city endpoints Business profile

Add to Reading List

Source URL: nl.malwarebytes.com

Language: English - Date: 2016-07-07 18:38:56
408Software / System software / Computer security / Antivirus software / Malwarebytes / Malware / Avira / Marcin Kleczynski / IObit

C A S E S T U DY Sun Products Corporation cleans up malware Leading provider of household products adds a layer of protection against malware and exploits with Malwarebytes Endpoint Security

Add to Reading List

Source URL: pt.malwarebytes.com

Language: English - Date: 2016-07-07 18:41:23
409Computer access control / Cryptography / Obfuscation / Identity management / Password / Security / Cybercrime / Crypt / Phishing / Password strength / Password manager

Microsoft Word - Context Sensitive Password.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-05-29 23:54:55
410Computing / Computer security / Actuarial science / Information privacy / Privacy Analytics / Privacy / Prevention / Internet privacy / Big data / Threat / Risk / Privacy Impact Assessment

RISK MONITOR Privacy Analytics Risk Monitor Understand Your Risks Privacy Risk Assessment Tool

Add to Reading List

Source URL: www.privacy-analytics.com

Language: English - Date: 2016-05-25 11:54:56
UPDATE