Computer security

Results: 47159



#Item
671Security / Prevention / Safety / Crime prevention / Security guards / Public safety / Surveillance / Bodyguard / Academi / Corporate security / Computer security

TACTICAL SECURITY/SAFETY TECHNIQUES ENTERPRISES, INC. PO Box 4794 • Poughkeepsie, NY 12602 • (Website: www.tstenterprisesinc.com E-mail Addresses: WILLIAM J. SLEIGHT, III Preside

Add to Reading List

Source URL: www.tstenterprisesinc.com

Language: English - Date: 2016-04-02 14:26:28
672Computing / Security / Cryptography / Cloud computing / Information technology management / Crime prevention / National security / Digital transaction management / XDTM Standard Association / Records management / Computer security / ARX

The xDTM Standard The Transaction Management Standard for an Open Digital World Executive Brief The xDTM Standard

Add to Reading List

Source URL: www.xdtm.org

Language: English - Date: 2016-06-28 14:48:03
673Security / Computing / Prevention / Computer security / Crime prevention / Cryptography / Information governance / National security / Cloud computing security / European Network Exchange / Norbert Pohlmann / Data security

Day 1 (November:00 10:15 Registration Opening Morning Coffee

Add to Reading List

Source URL: www.isse.eu.com

Language: English - Date: 2015-11-09 09:09:16
674Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Avira / Computer virus / Zero-day / Marcin Kleczynski

C A S E S T U DY Knutson Construction builds better malware defenses Minnesota construction company uses Malwarebytes Anti-Malware to clean up serious malware outbreak

Add to Reading List

Source URL: es.malwarebytes.com

Language: English - Date: 2016-07-07 18:34:11
675Computing / Security / Linear Tape-Open / Information science / Data management / Backup / Data security / Data corruption / Computer security / Linear Tape File System / Magnetic tape data storage

Security » Easily stored offline to protect against on-line data corruption » Easily stored offsite in case of a disaster recovery situation » Hardware based data encryption for added data security » WORM cartrid

Add to Reading List

Source URL: www.lto.org

Language: English - Date: 2014-09-08 23:24:42
676Computing / Internet privacy / Internet / Computer security / Privacy / Identity management / Internet security / Human rights / Tor / Information privacy / Google Public DNS / HTTP cookie

DE GRUYTER OLDENBOURG it – Information Technology 2015; Galley Proof Self-Portrayals of GI Junior Fellows Dominik Herrmann*

Add to Reading List

Source URL: junior-fellows.gi.de

Language: English - Date: 2016-03-23 12:56:37
677Software / Computing / Computer architecture / Computing platforms / Monolithic kernels / Kernel / Linux kernel / Address space layout randomization / Linux / Android / User space

Anatomy of a Remote Kernel Exploit Dan Rosenberg Copyright © 2011 Virtual Security Research, LLC.

Add to Reading List

Source URL: vulnfactory.org

Language: English - Date: 2012-01-16 13:38:49
678Security / Cryptography / Prevention / E-commerce / Crime prevention / Information governance / National security / Computer security / Internet privacy / Authorization / Password / Privacy

University of Arkansas System Division of Agriculture Computer and Network Use Policy - PMGS 14-1

Add to Reading List

Source URL: division.uaex.edu

Language: English - Date: 2014-09-19 11:50:26
679Security / Computing / Prevention / Secure communication / Data security / Crime prevention / Cryptography / National security / Trustwave Holdings / Data breach / Computer security / Cyber-Insurance

Reprinted with permission from the October 2015 issue Cybercrimes And The Threat To Lender Data How stronger security and response plans can protect lenders from a data breach. By Lee Brodsky

Add to Reading List

Source URL: www.mortgagebankinginsurance.com

Language: English - Date: 2015-11-12 13:58:00
680Security / Prevention / Safety / Computer security / Government of the United Kingdom / Information sensitivity / Data security / Cyberwarfare / Security Policy Framework / Regulatory compliance / IT risk / National Cyber Security Policy

VICTORIAN PROTECTIVE DATA SECURITY FRAMEWORK JUNE 2016

Add to Reading List

Source URL: www.cpdp.vic.gov.au

Language: English - Date: 2016-06-28 01:36:03
UPDATE