Computer security

Results: 47159



#Item
611Computer access control / Computer security / Access token / Token / Security / Access control / Security token / RSA SecurID

Emerald Insight Access Tokens – An Administrator’s Guide This document provides an overview of access tokens, including: ‘what is an access token and why do I need one?’, in addition to guidance on how to activa

Add to Reading List

Source URL: www.emeraldgrouppublishing.com

Language: English - Date: 2015-11-25 03:54:07
612Computer security / Security / Prevention / Crime prevention / Data security / National Security Agency / National Information Assurance Partnership / Common Criteria Evaluation and Validation Scheme / Common Criteria Testing Laboratory / Common Criteria / Protection Profile / Evaluation Assurance Level

Microsoft Word - scheme-differences-2013.docx

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-10 07:41:12
613Information technology management / Information technology / Computing / Human resource management / Human resource management system / HRMS / Enterprise content management / Computer security

THE PST Project News ISSUE 1 December 22, 2010

Add to Reading List

Source URL: www.synergycentric.com.my

Language: English - Date: 2013-01-10 00:21:00
614Prince Edward County /  Virginia / Prevention / Security / Longwood University / Clery Act / Computer security / Background check / Psychology / Farmville /  Virginia / Longwood /  Florida

VACANCY ANNOUNCEMENT Assistant Professor of Psychology Department of Psychology Full-time, Tenure-track faculty, Position #F0186 The Department of Psychology at Longwood University in Farmville, Virginia invites applica

Add to Reading List

Source URL: www.longwood.edu

Language: English - Date: 2016-08-01 12:19:09
615Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Avira / Computer virus / Zero-day / Marcin Kleczynski

C A S E S T U DY Food for the Hungry stops malware in its tracks This nonprofit uses Malwarebytes Anti-Malware for Business to detect and stop malware from gobbling valuable time from its mission

Add to Reading List

Source URL: fr.malwarebytes.com

Language: English - Date: 2016-07-07 18:35:52
616Computer access control / Cryptography / Computer security / Computing / Password / Security token / Login / Session / Password manager / Self-service password reset

Security Measures of Trading System AyersGTS’s underlying software architecture is supported by a Security Server which provides (a) user authentication by login mechanism; (b) maintains session’s validity; (c)functi

Add to Reading List

Source URL: www.hkfoundersc.com

Language: English - Date: 2015-06-22 02:44:30
617Security / Prevention / Computer security / Crime prevention / Cryptography / Information governance / National security / Information security / FIPS 140-2 / Consultant / Professional certification / Common Criteria

Introducing atsec information security Chief Executive Officer, Director of Strategy and Business Devlopment Who are we?

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:21:34
618Cyberwarfare / Computer security / Computing / Malware / Computer network security / Multi-agent systems / Spamming / Malware analysis / Antivirus software / Computer virus / Rootkit / Botnet

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:17:19
619Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Computer virus / Zero-day / Avira / Rogue security software / Draft:Marcin Kleczynski / Marcin Kleczynski

C A S E S T U DY Imperial College gives malware a failing grade With Malwarebytes Anti-Malware for Business, the university proactively protects valuable intellectual property on thousands of PCs

Add to Reading List

Source URL: nl.malwarebytes.com

Language: English - Date: 2016-07-07 18:38:56
620Law / Internet privacy / Delta Dental / Prevention / Password / Health Insurance Portability and Accountability Act / Terms of service / HTTP cookie / Copyright law of the United States / Computer security

Effective Date: November 12, 2014 DELTA DENTAL OF ILLINOIS Terms and Conditions of Use These Terms and Conditions of Use (these “Terms”) govern and control your access to, disclosure of, and use of Delta Dental of Il

Add to Reading List

Source URL: www.deltadentalil.me

Language: English - Date: 2016-06-30 12:22:42
UPDATE