Computer security

Results: 47159



#Item
621Security / Prevention / Safety / Computer security / Data security / Crime prevention / Cryptography / National security / Information security / Health Insurance Portability and Accountability Act / Access control / Security controls

Microsoft Word - original policy template.docx

Add to Reading List

Source URL: it.ouhsc.edu

Language: English - Date: 2014-11-14 16:36:30
622Computer security / Security / Cyberwarfare / Computer network security / Qualys / Vulnerability / Attack / Asset / Threat

Solution Brief: Top 6 Security Use Cases for Automated Asset Inventory SOLUTION BRIEF TOP 6 SECURITY USE CASES

Add to Reading List

Source URL: www.qualys.com

Language: English - Date: 2016-01-15 14:54:13
623Business / Small business / Biometrics / Computer law / Cryptography / Electronic signature / Signature / Security / New York State Small Business Development Center

PDF Document

Add to Reading List

Source URL: www.iowasbdc.org

Language: English - Date: 2016-07-27 14:51:17
624Data security / Computing / Prevention / Computer security / Security / Information technology management / Information security management system / ISO/IEC 27001:2013 / Management system / Information security / ISO/IEC 27001:2005 / ISO/IEC 27000-series

Information Security Management Systems Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer © atsec information security, 2013

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 08:09:37
625Cryptography standards / Computer security / Cryptography / Evaluation / FIPS 140-2 / Common Criteria / FIPS 140 / Common Criteria Testing Laboratory / Cryptographic Module Testing Laboratory

Microsoft Word - Choose_Testing_Lab.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-10 07:41:12
626Energy / Security / Smart grid / Emerging technologies / Electric power / Electric power distribution / Smart meter / Professional mobile radio / Energy industry / Computer security

24 to 26 NovemberPress Release Frankfurt am Main, 3 NovemberThe PMR Conference and Energy Industry Forum offer a wide range

Add to Reading List

Source URL: www.pmrexpo.de

Language: English
627Computer security / Cyberwarfare / Software / Antivirus software / Malwarebytes / Malware / Computer virus / Ransomware / Zero-day / Rootkit / Marcin Kleczynski

C A S E S T U DY Agnico Eagle Mines Ltd. strikes gold with Malwarebytes Malwarebytes proactively blocks exploits from entering and digging in Business profile

Add to Reading List

Source URL: es.malwarebytes.com

Language: English - Date: 2016-07-21 17:41:23
628Information privacy / E-commerce / Payment cards / Computer law / Payment Card Industry Data Security Standard / Audit / Economy / Peripheral Component Interconnect / Money / Information / PA-DSS / PCI-X

CASE STUDY: International Payment Services BACKGROUND As specialists in domestic and international

Add to Reading List

Source URL: www.securitymetrics.com

Language: English - Date: 2016-08-17 15:46:07
629Cybercrime / Computing / Security / Crime / Identity theft / Social engineering / Cryptography / Crime prevention / Phishing / Password / Computer security / Security hacker

Defending Against Phishing & Social Engineering Attacks A Resource Guide from the PCI Security Standards Council Hackers use phishing and other social engineering methods to target organisations with legitimate-looking e

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2015-10-27 10:54:34
630Security / Prevention / Safety / Access control / Identity management / Computer security / Data security / Computer access control / Internet privacy / Privacy / Information security / Personal /  Inc.

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-16 07:20:49
UPDATE