Computer security

Results: 47159



#Item
801Security / World Concern / E-commerce / Computing / Text messaging / Mobile app / Aid / Computer security

FOR IMMEDIATE RELEASE MEDIA CONTACT: Cathy Herholdt, World Concernofficecell)

Add to Reading List

Source URL: worldconcern.org

Language: English - Date: 2014-04-03 13:37:42
802Data security / Computing / Prevention / Information technology management / Information privacy / Privacy / Computer security / Security / Information security / Personally identifiable information / Data Protection Directive / Professional certification

Neue EU-Datenschutz-Verordnung:

Add to Reading List

Source URL: ir.cis-cert.com

Language: English - Date: 2014-01-21 11:13:20
803Prevention / Security / Safety / Computer security / National security / Data security / Cryptography / Information security / Risk / Threat / Resilience / Human security

Security Metrics and Security Investment Models Rainer B¨ohme International Computer Science Institute, Berkeley, California, USA

Add to Reading List

Source URL: informationsecurity.uibk.ac.at

Language: English - Date: 2016-07-15 15:37:41
804Prevention / Safety / Security / Emerging technologies / National security / Cyberwarfare / Crime prevention / Risk management / Unmanned aerial vehicle / Computer security / Risk assessment / Central Intelligence Agency

UNCLASSIFIED Oude WaalsdorperwegAK Den Haag P.O. BoxJG The Hague

Add to Reading List

Source URL: www.thehaguesecuritydelta.com

Language: English - Date: 2016-04-07 04:25:36
805Computer access control / Computer security / Computing / Identity management / Federated identity / Metadata standards / Security Assertion Markup Language / SAML 2.0 / Shibboleth / XACML / OpenID / OAuth

Milestone MJRA1.3: Design for the integration of an Attribute Management Tool

Add to Reading List

Source URL: aarc-project.eu

Language: English - Date: 2016-07-21 05:59:16
806Internet privacy / Computing / World Wide Web / Computer security / HTTP cookie / P3P / Privacy / Facebook Beacon / Opt-out / Google Analytics / Cookie / Personally identifiable information

DIAGEO PRIVACY AND COOKIE NOTICE This Privacy and Cookie Notice provides a high-level overview of our full Privacy and Cookie Notice (Please see below). It summarises important information regarding how we collect, use,

Add to Reading List

Source URL: www.guinness-storehouse.com

Language: English - Date: 2015-12-10 12:05:17
807Internet privacy / HTTP cookie / Computer security / Computing / Privacy mode / World Wide Web / Web browser / Evercookie / Zombie cookie

THE FACTS: COOKIES What are cookies and what do they do? A cookie is information a website saves to your computer using your web browser. A cookie allows sites to record your browsing activities –what pages and content

Add to Reading List

Source URL: www.arcyber.army.mil

Language: English - Date: 2016-03-15 15:31:42
808Software / Computing / Digital media / Social media / Social networking services / Cybercrime / Social networks / Universal Windows Platform apps / Social engineering / Internet privacy / Computer security / Facebook

North Carolina Office of the Governor North Carolina Office of Information Technology Services North Carolina Department of Cultural Resources Best Practices for State Agency Social Media Usage in North Carolina Version

Add to Reading List

Source URL: digitalpreservation.ncdcr.gov

Language: English - Date: 2016-05-02 15:16:04
809Computer security / Software / Cyberwarfare / United States Department of Homeland Security / Infrastructure / National security / Antivirus software / Critical infrastructure protection / SCADA / Cyber-attack / Smart grid / Stuxnet

Summary Within the EU project CockpitCI “Cybersecurity on SCADA: risk prediction, analysis and reaction tools for Critical Infrastructure” and under the patronage of Étienne Schneider, Minister of Economy and Foreig

Add to Reading List

Source URL: www.itrust.lu

Language: English - Date: 2016-03-11 09:45:07
810Cryptography / Cyberwarfare / Malware / Computer security / Cryptovirology / Ransomware / Random number generation / Computer virus / Pseudorandomness / PGPCoder / Random seed / Deniable encryption

The challenge Victim targeting using random generators Auto-protection using deniable encryption Invisibility using statistical simulability The challenge

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
UPDATE