Computer security

Results: 47159



#Item
441Computer security / Security / Computing / Evaluation Assurance Level / Security Target / Common Criteria / Protection Profile / Crime prevention / Cryptography / Information governance / National security / Evaluation

Sertifiseringsmyndigheten for IT-sikkerhet Norwegian Certification Authority for IT Security SERTIT-012 CR Certification Report IssueMarchThales Operator Terminal Adapter

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-09-19 06:43:32
442Computing / Message-oriented middleware / Inter-process communication / Computer access control / Internet protocols / Middleware / Advanced Message Queuing Protocol / JSON Web Token / Message queue / Security token / OAuth

Advanced Message Queuing Protocol (AMQP) Claims-based Security Version 1.0 Working DraftAugust 2013

Add to Reading List

Source URL: www.oasis-open.org

Language: English
443Computer security / Cybercrime / Harassment / Cyber / Crime / Misconduct

Assessing Police Perceptions of Cybercrime and the Law Enforcement Response in England and Wales Adam M. Bossler, Georgia Southern University George W. Burruss, University of South Florida Thomas J. Holt, Michigan State

Add to Reading List

Source URL: www.cambridgecybercrime.uk

Language: English - Date: 2016-08-05 10:26:39
444Cyberwarfare / Rootkit / Computer security / Transmission Control Protocol / Computing

Hardening Your System . . . . . . . . . . . . . . . . . . . . . 32 ▼ 5 Physical Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Attacking the Office . . . .

Add to Reading List

Source URL: www.hackinglinuxexposed.com

Language: English - Date: 2008-12-09 14:55:29
445Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Computer security / Information security / Internet privacy / Human security / Software security assurance

Security as a Practical Problem: Some Preliminary Observations of Everyday Mental Models Paul Dourish, Jessica Delgado de la Flor, and Melissa Joseph School of Information and Computer Science University of California, I

Add to Reading List

Source URL: www.andrewpatrick.ca

Language: English - Date: 2003-01-16 18:02:06
446Information privacy / Data security / Data protection / Privacy / Law / Glasgow / Data Protection Act / Internet privacy / Computer security / Privacy law / Privacy policy

Glasgow Museums - Kelvingrove Prize Draw Privacy Notice

Add to Reading List

Source URL: www.glasgowlife.org.uk

Language: English - Date: 2016-07-08 12:39:32
447Cryptography / Key management / Public key infrastructure / Public-key cryptography / Computer security / E-commerce / Public key certificate / Professional certification / Conveyancing / Certificate authority / Information security / Accreditation

Model Operating Requirements Version 3

Add to Reading List

Source URL: www.arnecc.gov.au

Language: English - Date: 2015-12-09 20:42:43
448Security / Kratos Defense & Security Solutions / Kratos / God of War / Fiction / Computer security / Titan Corporation / Integral Systems

August 28, 2015 Kratos Receives $49 Million Contract Award to Support U.S. Government Satellite Communications SAN DIEGO, Aug. 28, 2015 (GLOBE NEWSWIRE) -- Kratos Defense & Security Solutions, Inc. (Nasdaq:KTOS), a lead

Add to Reading List

Source URL: www.rtlogic.com

Language: English - Date: 2016-08-09 00:32:34
449Security / Education / Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Secure communication / University of Birmingham / Gisbert Kapp / Lecture

University of Birmingham Computer Science MSc Cyber Security Semester Two

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2016-01-12 06:53:34
450Computer security / Computing / Data security / Prevention / Security / IT risk management / Information privacy / Payment Card Industry Data Security Standard / Information security / Security controls / Federal Information Security Management Act / Regulatory compliance

Guide to IT Seurity Policies & Standards

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:17:55
UPDATE