Computer security

Results: 47159



#Item
461Computing / Internet privacy / Law / Computer security / Information privacy / Privacy policy / Privacy / HTTP cookie / Medical privacy / Personal /  Inc. / Data Protection Act / P3P

PRIVACY POLICY BACKGROUND: This Policy applies as between you, the User of this Website and Call Print Group Limited the owner and provider of this Website. This Policy applies to our use of any and all Data collected by

Add to Reading List

Source URL: www.callprint.co

Language: English - Date: 2015-07-20 10:13:05
462Business / Economy / Security / Advisors / Consultant / Small business / Computer security

CGM Computer Consulting ITRODUCTIO Established in 1997, CGM Computer Consulting (CGMCC) provides information technology services to support the business objectives of our clients. CGMCC offers expertise in systems engi

Add to Reading List

Source URL: www.cgmcc.com

Language: English - Date: 2010-08-06 17:48:09
463Computing / Security / Secure communication / Cyberwarfare / Computer security / Information privacy / Human rights / Data protection / Internet privacy / Privacy / Data mining / Internet security

Large-Scale Collection and Sanitization of Network Security Data: Risks and Challenges∗ (position paper) Phillip Porras Vitaly Shmatikov

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2006-07-31 13:42:23
464Computer architecture / Software / System software / Embedded Linux / Linux distributions / Linux kernel / Linux / MontaVista / Loadable kernel module

Linux Kernel Exploitation Earning Its Pwnie a Vuln at a Time Jon Oberheide CTO, Scio Security This document is confidential and is intended solely for use by its original recipient for informational

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-11 18:23:38
465Computing / Computer security / Software engineering / Computer network security / Cyberwarfare / Data security / Firewall / Network management / Trusted Information Systems / APL / Guard / Malware

Frederick M. AvolioFrederick Road Woodbine, MD5215 (mh)

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2010-05-14 09:24:10
466Security / Prevention / Computing / Crime prevention / Cryptography / Information governance / National security / Data security / Information security / Intranet / Computer security / Draft:ICT Security Policy System: A Case Study

Ministry of Lands& Natural Resources INFORMATION & COMMUNICATION TECHNOLOGY (ICT) POLICYICT POLICY DOCUMENT

Add to Reading List

Source URL: mlnr.gov.gh

Language: English - Date: 2015-06-02 10:15:24
467Computing / Network management / Information technology management / Computer network security / Local area networks / Virtual LAN / Load balancing / Ixia / Firewall / Data monitoring switch / Net Optics

DATA SHEET IXIA XSTREAM 10 TM AGGREGATION, FILTERING, AND

Add to Reading List

Source URL: www.ixiacom.com

Language: English - Date: 2016-07-25 19:36:58
468Software / Computer security / Prevention / Computer access control / Password / Security / Login / Expect / Semantic URL attack / Password policy

Journey TM College Student Registration Instructions Student Name: .

Add to Reading List

Source URL: www.irsc.edu

Language: English - Date: 2016-01-12 09:58:01
469Computer worms / Cyberwarfare / Cybercrime / Computer security

EN1.17 Visualization Support for Intrusion Detection and Forensics Joseph Chang It is of great interest to law enforcement and security personnel to discover the source of a worm attack in order to combat the threat and

Add to Reading List

Source URL: aao.sinica.edu.tw

Language: English - Date: 2014-10-02 04:23:39
470Software / System software / Computing / Rogue software / Computer viruses / Deception / Internet security / Macro virus / Spyware / Antivirus software / Microsoft Windows / File dialog

Polaris: Usable Virus Protection for Windows Ka-Ping Yee Marc D. Stiegler, Alan H. Karp, Tyler Close Mark S. Miller

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-06-21 09:58:18
UPDATE