Computer security

Results: 47159



#Item
511Computing / Computer network security / Network architecture / Wireless networking / Local area networks / IEEE 802.11 / Computer security / IEEE 802.11e-2005 / Wireless security / Denial-of-service attack / Data link layer / Transmission Control Protocol

Detecting Identity Spoofs in IEEE 802.11e Wireless Networks

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English
512Library science / Technology / Security / Internet / Public computer / Library / Computer security / Public library / Sumter County Library /  FL / Kropyvnytskyi Region Universal Research Library

HERITAGE PUBLIC LIBRARY PUBLIC ACCESS COMPUTER AND INTERNET POLICY Subject to the laws, regulations, and ordinances of the United States of America, the Commonwealth of Virginia, and the counties of Charles City and New

Add to Reading List

Source URL: www.heritagepubliclibrary.org

Language: English - Date: 2014-06-16 17:07:41
513Data security / Prevention / Safety / Security / Computer security / National security / Information privacy / Personal Information Protection and Electronic Documents Act / Privacy / Medical privacy / Internet privacy / Information security

Privacy Statement & Terms of Use Kinder Morgan Canada is firmly committed to maintaining confidentiality, respecting personal privacy, and protecting personal information. Our policy is based on the federal Personal Info

Add to Reading List

Source URL: www.kindermorgan.com

Language: English - Date: 2015-01-29 11:27:09
514Computer access control / Identity management / Computer security / Computing / Metadata standards / Security Assertion Markup Language / Authentication / EduGAIN / Workflow

MJRA1.4: First Draft of the Blueprint Architecture Milestone MJRA1.4

Add to Reading List

Source URL: aarc-project.eu

Language: English - Date: 2016-08-01 07:07:50
515Computer security / Security / FireEye / Internet privacy / Privacy / Michael McCaul

March 18, 2016 The Honorable Michael McCaul Chairman Committee on Homeland Security H2-176 Ford House Office Building Washington, DC 20515

Add to Reading List

Source URL: homeland.house.gov

Language: English - Date: 2016-03-18 11:08:26
516Computer security / Security / Prevention / Cryptography / Crime prevention / Information governance / National security / Transparency / Common Criteria / Electronic voting / Information security / Trust law

Security Watch Rebecca T. Mercuri Trusting in Transparency In providing security assurances, transparency and trust are inherently

Add to Reading List

Source URL: www.notablesoftware.com

Language: English - Date: 2007-02-28 16:30:00
517Microsoft / Security / Prevention / Patent application / Password / Outlook.com / Computer security / Web application

Online Application This instruction guide is for currently certified firms seeking renewal and firms applying for the first time. The information presented is drawn from example scenarios and may not exactly match your

Add to Reading List

Source URL: www.dot.nd.gov

Language: English - Date: 2015-07-15 09:45:19
518Humancomputer interaction / Human communication / Interpersonal communication / User interface techniques / Multimodal interaction / Technical communication / User interface / Sonification / Usability / Computer security / Mode / Graphical user interface

Integration of Auditive and Visual Feedback in the Design of Interfaces for Security Applications Jaime Muñoz1, Ricardo Mendoza1, Francisco Álavarez1, Miguel Vargas Martin2, Alberto Ochoa3 1

Add to Reading List

Source URL: www.clihc.org

Language: English - Date: 2007-09-01 16:40:18
519Cybercrime / Security / IID / Crime / Phishing / Computer security

New identity for new markets, new products IID adds clarity to cyberthreat intelligence by distilling threat data from thousands of trusted sources, and fusing it into

Add to Reading List

Source URL: www.voxuspr.com

Language: English - Date: 2016-01-20 18:07:01
520Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Avira / Computer virus / Zero-day / Marcin Kleczynski

C A S E S T U DY Knutson Construction builds better malware defenses Minnesota construction company uses Malwarebytes Anti-Malware to clean up serious malware outbreak

Add to Reading List

Source URL: pt.malwarebytes.com

Language: English - Date: 2016-07-07 18:41:23
UPDATE