Computer security

Results: 47159



#Item
861Software / Computer security / System software / Antivirus software / Proprietary software / Norton Internet Security / Benchmark / PCMark / Computer virus / Avira / Malware / Norton

Document: Authors: Company: Date: Edition: File:

Add to Reading List

Source URL: www.passmark.com

Language: English - Date: 2015-11-30 00:17:08
862Prevention / Security / Safety / Computer security / National security / Cyberwarfare / Cybercrime / Insider threat / Espionage / Outline of computer security / Cyberwarfare in the United States

THE FACTS: INSIDER THREATS Organizations can often mitigate the threat of outsiders stealing their property, either physically or electronically. But the insider -- the employee with legitimate access – can be much har

Add to Reading List

Source URL: www.arcyber.army.mil

Language: English - Date: 2016-03-15 15:31:42
863Business / Computing / Technology / Industrial automation / Internet of Things / Predix / Technology forecasting / Customer experience management / Help desk / Computer security incident management / Technical support / General Electric

Technical Support Policy Predix Platform Services You may receive technical support services from GE (“us” or “we”) for the Predix platform in three ways, as described below. DEFINITIONS: The following terms as u

Add to Reading List

Source URL: www.predix.io

Language: English - Date: 2016-08-18 18:39:54
864Software / Computing / Remote desktop / Computer network security / Tunneling protocols / Virtual private networks / OpenConnect / Citrix Systems / Windows 10 / Personal computer / Google Chrome

work IQ badges_PMS_COLORS

Add to Reading List

Source URL: www.oc.com

Language: English - Date: 2016-06-02 15:50:09
865Computer access control / Security / Computer security / Prevention / Multi-factor authentication / Authentication / Security token / ESET / Information security / Access control / Electronic authentication / Strong authentication

ESET Secure Authentication Second factor authentication and compliance Document VersionNovember, 2013

Add to Reading List

Source URL: static5.esetstatic.com

Language: English - Date: 2014-02-07 08:20:03
866Smart cards / Computing / Security / Ubiquitous computing / Computer access control / ISO standards / HID Global / MIFARE / Card reader / Java Card OpenPlatform / Java Card / Access control

LOGICAL AND PHYSICAL ACCESS SOLUTIONS Crescendo® C1150 ƒƒ Higher security – Encryption and data signing protects data-at-rest and enables trusted secure communications. ƒƒ Supports Secure Identity Object™ (SIO)

Add to Reading List

Source URL: planc.biz

Language: English - Date: 2013-12-17 10:12:36
867National security / Prevention / Security / Safety / Financial regulation / International finance institutions / Cybercrime / International Organization of Securities Commissions / E-commerce / Resilience / Cyber-attack / Computer security

Press release Press enquiries: +www.bis.org Ref no: IOSCO/MR

Add to Reading List

Source URL: www.iosco.org

Language: English - Date: 2016-06-29 09:35:28
868Information privacy / Payment cards / Economy / Computing / E-commerce / Business / Cryptography / Computer law / Payment Card Industry Data Security Standard / Information security / Data security / Network segmentation

Microsoft Word - PCI DSS Information Security Policy (v2016.1)

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:18:04
869Security / Computer security / Information technology management / Data security / System administration / Splunk / Computer network security / Cyberwarfare / Cryptography

SECURITY PROFESSIONAL SERVICES Security Program Review Services Improve Your Security Posture Overview

Add to Reading List

Source URL: www.splunk.com

Language: English - Date: 2016-01-08 01:13:16
870Economy / Business / Labour law / Social programs / Social security / Unemployment benefits / Validation / Unemployment / Evaluation / Insurance / Social security in Australia / Computer security

CLASSIFICATION EMPLOYMENT AND TRAINING ADMINISTRATION ADVISORY SYSTEM U.S. DEPARTMENT OF LABOR Washington, D.C

Add to Reading List

Source URL: workforcesecurity.doleta.gov

Language: English - Date: 2016-08-08 11:01:47
UPDATE