Computer security

Results: 47159



#Item
421Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Avira / Computer virus / Rootkit / Marcin Kleczynski / IObit

Crushes malware. Restores confidence. Malwarebytes products have a proven record of protecting computers by completely removing all forms of malware including viruses, trojans, spyware, adware, and rootkits. Intelligent

Add to Reading List

Source URL: www.malwarebytes.com

Language: English - Date: 2016-08-19 18:33:39
422Technology / Digital media / Computing / Email / Password / Security / Internet

THIS IS A SAMPLE POLICY ONLY. MODIFY AS YOU SEE FIT AND CONSULT YOUR ATTORNEY OR HUMAN RESOURCE DEPARTMENT BEFORE IMPLEMENTING All internet and computer hardware and software including e-mail systems are the property of

Add to Reading List

Source URL: www.wsbcs.net

Language: English - Date: 2015-11-20 18:19:22
423Information privacy / Economy / Payment cards / Computing / E-commerce / Information / Cryptography / Computer law / Payment Card Industry Data Security Standard / Information security / Data security / Network segmentation

Microsoft Word - PCI DSS Information Security Policy (v2016.1)

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:18:12
424Software / Computer security / Cyberwarfare / Antivirus software / Malwarebytes / Malware / Ransomware / Computer virus / Zero-day / Marcin Kleczynski / IObit

C A S E S T U DY At PAPSTAR GmbH, malware no longer crashes the party Leading European distributor of party and catering products uses Malwarebytes to avoid downtime and revenue loss

Add to Reading List

Source URL: br.malwarebytes.com

Language: English - Date: 2016-07-06 12:29:13
425Medicine / Cardiac electrophysiology / Neuroprosthetics / Technology / Security / Wireless networking / Artificial cardiac pacemaker / Biomedical engineering / Cybernetics / Medical device / Ubiquitous computing / Privacy

MOBILE AND UBIQUITOUS SYSTEMS www.computer.org/pervasive Security and Privacy for Implantable Medical Devices Daniel Halperin, Thomas S. Heydt-Benjamin, Kevin Fu, Tadayoshi Kohno, and William H.

Add to Reading List

Source URL: secure-medicine.org

Language: English - Date: 2016-03-07 16:20:02
426Logic / Proof theory / Mathematical logic / Philosophy / Sequent / Linear logic / Soundness / Logic programming / Inductive reasoning

FCS 2009 Workshop on Foundations of Computer Security July 10th, 2009 Los Angeles, California, USA Affiliated with LICS’09

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2009-07-20 04:50:04
427Security / Prevention / Safety / Crime prevention / Law enforcement / National security / Closed-circuit television / Surveillance / Tablet computer

Information Technology Solutions Portable OmniWatch® ISR Video Kit P o rt a b l e I S R V i d e o K i t DESIGN

Add to Reading List

Source URL: insitupacific.com.au

Language: English - Date: 2015-08-09 23:36:27
428Computer security / Computer access control / Identity management / Federated identity / Public administration / Open government / Digital identity / Authentication / E-government / National Strategy for Trusted Identities in Cyberspace / Interoperability / EGovernment in Europe

Microsoft Word - SSEDIC Press Release - Talamo _2_.docx

Add to Reading List

Source URL: www.eid-ssedic.eu

Language: English
429Risk / Safety / Probability / Computer security / Actuarial science / Reliability engineering / Risk assessment / Safety engineering / Threat

Fort Peck Community College Fort Peck Community College Policies & Procedures Page 246

Add to Reading List

Source URL: www.fpcc.edu

Language: English - Date: 2015-11-20 15:42:36
430Security / Prevention / Safety / National security / Computer security / Crime prevention / Cryptography / Information governance / International Multilateral Partnership Against Cyber Threats / DigiNotar / Information security / Cyberwarfare

Cyber security guide for boardroom members 2 | Cyber security guide for boardroom members

Add to Reading List

Source URL: www.cybersecurityraad.nl

Language: English - Date: 2016-08-20 14:48:32
UPDATE