Computer security

Results: 47159



#Item
491Security / Prevention / Computer security / Data security / Crime prevention / Cryptography / National security / Information security / ISO/IEC 27001:2013 / Security controls

VPDSF Rosetta Stone (Core) CORE VICTORIAN PROTECTIVE DATA SECURITY FRAMEWORK (VPDSF) ROSETTA STONE

Add to Reading List

Source URL: www.cpdp.vic.gov.au

Language: English - Date: 2016-06-28 19:52:48
492National security / Security / Prevention / Safety / Financial regulation / International finance institutions / Cybercrime / International Organization of Securities Commissions / E-commerce / Resilience / Cyber-attack / Computer security

Press release Press enquiries: +www.bis.org Ref no: IOSCO/MR

Add to Reading List

Source URL: www.iosco.org

Language: English - Date: 2016-06-29 09:35:28
493Computing / Security engineering / Security / Smart devices / Vacation rental / Internet of Things / Smart lock / Renting / Key / Computer security / Smart TV / Draft:August Home

60 Percent of Guests Would Pay More for a Vacation Rental with a Smart Home Feature, August Home Study Reveals Smart Tech Helping Short-Term Rental Hosts Deliver Experience Superior to Hotels; Property More Secure with a

Add to Reading List

Source URL: august.com

Language: English - Date: 2016-08-03 16:40:46
494Computing / Security / Computer security / E-commerce / Secure communication / Tor / Ricochet / Software testing / Cryptography / Vulnerability / Transport Layer Security / Data validation

Ricochet Security Assessment Ricochet February 15, 2016 – Version 1.2 Prepared for John Brooks

Add to Reading List

Source URL: penetrationstest.se

Language: English - Date: 2016-04-11 13:49:12
495Cryptography / Computer security / Security / Computer access control / Challengeresponse authentication / Password / Cryptographic nonce / Authentication / Server / Biometrics / Key / Public-key cryptography

WITH VAULTED VOICE VERIFICATION MY VOICE IS MY KEY R.C. Johnson and Terrance E. Boult

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2013-12-13 13:04:18
496Security / Economy / Business / Crime prevention / Chief information security officer / CIO magazine / Physical security / Surveillance / Senior management / Corporate title / Computer security / Security guard

Press Contact Joran Thompson CIO & CISO Summit France: CALL FOR SPEAKERS

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2016-01-29 13:14:10
497Cryptography / Computer access control / HID Global / IdenTrust / Authentication / Bank / Security / Computer security / EBAM

PDF Document

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2015-08-11 19:17:39
498Prevention / Risk / Economy / Auditing / Security / Data security / Computer security / Actuarial science / ISO/IEC 27001:2013 / Audit / Regulatory compliance / Professional certification

           

Add to Reading List

Source URL: www.isignthis.com

Language: English - Date: 2015-07-15 00:02:13
499Economy / Financial services / Computer access control / Finance / Online banking / Banking / Security token / Bank / Smart card / Direct bank / Authentication / Industrial and Commercial Bank of China

A new trend in China Easy and secure e-banking for everybody ICBC bank The challenge

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:37
500Computing / Central processing unit / Security / Cryptography / Cyberwarfare / Backdoor / Rootkits / Spyware / Computer security / Microcode

Modern Hardware is Complex •  Modern systems built on layers of hardware Tamper Evident Microprocessors

Add to Reading List

Source URL: oakland31.cs.virginia.edu

Language: English - Date: 2010-05-25 18:37:01
UPDATE