Computer security

Results: 47159



#Item
541Security / Academia / Internet of Things / Economic development / Organizational theory / Public policy / Smart city / Sustainable urban planning / Computer security / Penton / ISO/IEC JTC 1/SWG 5

Real-world IoT. 
 Real people.
 Real projects. MANUFACTURING

Add to Reading List

Source URL: www.bpinetwork.org

Language: English - Date: 2016-06-22 19:21:38
542Computing / Software / Security / Blackbaud / Computer security / Yahoo! Mail

Customer Support Guide www.blackbaud.co.uk Shackleton House | 5th Floor | 4 Battle Bridge Lane | London | SE1 2HP

Add to Reading List

Source URL: www.blackbaud.co.uk

Language: English - Date: 2016-02-01 07:25:47
543Security / Prevention / Safety / Crime prevention / Common Access Card / National security / Cybercrime / Defense Enrollment Eligibility Reporting System / Insert / Computer security / Security guard

Microsoft Word - Document1

Add to Reading List

Source URL: osec.doc.gov

Language: English - Date: 2012-06-07 14:40:49
544Computer security / Cyberwarfare / Software / Antivirus software / Malwarebytes / Malware / Computer virus / Ransomware / Zero-day / Rootkit / Marcin Kleczynski

C A S E S T U DY Agnico Eagle Mines Ltd. strikes gold with Malwarebytes Malwarebytes proactively blocks exploits from entering and digging in Business profile

Add to Reading List

Source URL: pl.malwarebytes.com

Language: English - Date: 2016-07-21 17:51:34
545Microsoft / Computing / Software / Computer access control / Webmail / Password / Security / Login / Outlook.com / Email

190505810250left0Authorized Payer Access Access as an Authorized Payer provides parents, guardians, or other individuals access to view and make payments on a student’s account. Email Notification Authorized Payers wil

Add to Reading List

Source URL: tutorials.lionpath.psu.edu

Language: English
546Computer security / Computing / Data security / Security / Standards / Auditing / International standards / Security controls / ISO/IEC 27001:2013 / ISO/IEC 27002 / Management system / ISAE

Audit/Assurance Standards that report on a companies’ internal controls Management Relevant to the managing of certain

Add to Reading List

Source URL: vcloudproviders.vmware.com

Language: English - Date: 2016-07-19 00:54:20
547Economy / Business / E-commerce / Cybercrime / National security / International Test and Evaluation Association / Computer security / Email / Invoice / Point of sale

APPLICATION FOR EXHIBIT SPACE 2016 Cyber Security Workshop March 28-30, 2017 ~ Waters Edge Event Center ~ Belcamp, MD www.itea.org/Cyber ~ Email: Organization Name

Add to Reading List

Source URL: www.itea.org

Language: English - Date: 2016-07-27 11:18:09
548Computer access control / Obfuscation / Software / Password / Security / Pass / Password strength / Self-service password reset

These instructions are specifically for students admitted to Georgia Regents University. The following sections will give instructions on how to:   Section 1 – Resetting your GRU password

Add to Reading List

Source URL: www.augusta.edu

Language: English - Date: 2016-04-06 23:30:17
549Norbert Pohlmann / Cryptography / Computer access control / Fog Investigation and Dispersal Operation / Gelsenkirchen / Fido / Authenticator / Internet security / Authentication / Cloud computing / Computing / Security

A New Approach For FIDO UAF  Advantages of a cloud-based FIDO Client Prof. Dr. (TU NN) Norbert Pohlmann

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2016-03-23 13:56:57
550Security / Prevention / Government / National security / Crime prevention / Mass surveillance / Cryptography / National Security Agency / United States government secrecy / Computer security / Surveillance / RSA Security

           

Add to Reading List

Source URL: judiciary.house.gov

Language: English - Date: 2016-03-10 11:31:32
UPDATE