Computer security

Results: 47159



#Item
731Computing / Auditing / Business economics / Information technology audit / Accounting / Security / Computer security / Data security / Audit / Information technology security audit / Security controls / New Jersey State Auditor

Microsoft WordScope Statement (Sdocx

Add to Reading List

Source URL: www.kslpa.org

Language: English - Date: 2016-02-11 17:28:05
732Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Avira / Rootkit / Marcin Kleczynski / IObit

C A S E S T U DY Sioux County roots out malware Malwarebytes helps county government secure endpoints and meet compliance requirements while increasing IT productivity Business profile

Add to Reading List

Source URL: fr.malwarebytes.com

Language: English - Date: 2016-07-07 18:35:52
733Cryptography / Security / Prevention / E-commerce / Crime prevention / Information governance / National security / Computer security / Certificate authority / Public key certificate / Information security / Password

PEXA Subscriber Security Policy Increment 3 PEXA System Security Policy VersionNovember 2014

Add to Reading List

Source URL: www.pexa.com.au

Language: English - Date: 2016-07-20 01:39:45
734Internet privacy / Computing / Privacy / Data security / Computer security / HTTP cookie / Information privacy / Personal /  Inc. / Personally identifiable information / Medical privacy / P3P / Do Not Track legislation

Privacy Statement NBN International is committed to protecting the privacy of its customers and of visitors to its website(s). However, it is necessary to collect, store and share your personal data in order to provide

Add to Reading List

Source URL: www.nbninternational.com

Language: English - Date: 2016-08-18 10:00:56
735Security / Prevention / Computer security / Access control / Data security / Cryptography / National security / Health Insurance Portability and Accountability Act / Medical privacy / Electronic health record / Vulnerability / Information technology audit

HIPAA Security Series #4 - Technical Safeguards

Add to Reading List

Source URL: www.hhs.gov

Language: English - Date: 2015-09-03 14:19:54
736Computer security / System software / Software / Trusted computing base / Mandatory access control / Security-Enhanced Linux / Kernel / Policy Monitoring / System call / XTS-400

The Case for Abstracting Security Policies   

Add to Reading List

Source URL: rich.recoil.org

Language: English - Date: 2006-04-13 14:58:02
737Security / Prevention / Safety / National security / Computer security / Crime prevention / Cryptography / Information governance / Information security / Continuous auditing / IT risk

Microsoft Word - Information Resource Activity Review Policy.docx

Add to Reading List

Source URL: it.ouhsc.edu

Language: English - Date: 2014-12-11 11:30:27
738Cyberwarfare / Computing / Computer network security / Computer security / Multi-agent systems / Botnets / Spamming / Malware / Computer virus / Spyware / Command and control / Cybercrime

THE FACTS: MALWARE AND BOTNETS What are computer viruses? Viruses are harmful computer programs that can be transmitted in a number of ways and differ in many ways, but are all designed to spread themselves from one comp

Add to Reading List

Source URL: www.arcyber.army.mil

Language: English - Date: 2016-03-15 15:31:42
739Computing / Software / Computer architecture / Smartphones / Mobile app / Google Play / Recommender system / Personal /  Inc. / Android / IOS / Internet privacy

Mobile App Recommendations with Security and Privacy Awareness Hengshu Zhu1 Hui Xiong2∗

Add to Reading List

Source URL: staff.ustc.edu.cn

Language: English - Date: 2014-11-13 08:20:35
740Security engineering / Security / Prevention / Access control / National security / Crime prevention / Airport security / Homeland security / Transportation Security Administration / Computer security

IB Union Calendar No. 505 114TH CONGRESS 2D SESSION

Add to Reading List

Source URL: docs.house.gov

Language: English
UPDATE