Computer security

Results: 47159



#Item
881Security / Cryptography / Prevention / Safety / Crime prevention / Information governance / National security / Computer security / Information security / Privacy / Internet of things / Encryption

Spring 2016: ICS 695 – Advanced Special Topics in Security: Advanced Security and Privacy for Internet of Things and its Applications Time Monday & Wednesday, 12:00-01:15pm.

Add to Reading List

Source URL: www2.hawaii.edu

Language: English - Date: 2015-10-29 18:36:38
882Computer hardware / USB / Computing / Microcontrollers / Server hardware / ARM architecture / Single-board computers

Greenbone Security Manager Product Specifications GSM 600

Add to Reading List

Source URL: www.greenbone.de

Language: English - Date: 2016-08-19 11:06:48
883Computer security / Information security operations center / Network management / Surveillance / Quantitative analyst / System on a chip / Business process modeling / Computing / Science and technology / Technology

A Human Capital Model for Mitigating Security Analyst Burnout Sathya Chandran Sundaramurthy Kansas State University

Add to Reading List

Source URL: www.usenix.org

Language: English
884Security / Computer security / Computer access control / Computer network security / Access control / Identity management / Multi-factor authentication / Authentication / Virtual private network / Secure Shell / Security token / Wireless security

Aintree NHS – Case Study Aintree University Hospitals Providing flexible and secure remote working for hospital staff

Add to Reading List

Source URL: www.cryptzone.com

Language: English - Date: 2015-04-28 16:57:36
885Computer security / Software / Cyberwarfare / Mobile Malware / Smartphones / Mobile security / Malware / Android / Computer virus / Google Play / DroidKungFu / Antivirus software

Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets Yajin Zhou Zhi Wang Wu Zhou Xuxian Jiang Department of Computer Science North Carolina State University {yajin zhou,zhi

Add to Reading List

Source URL: yajin.org

Language: English
886Computing / Software / System software / Embedded hypervisor / Hypervisor / Embedded system / Computer security / Wind River Systems / Internet of things

Press Release One in Five Embedded Projects Now Integrating Virtualization, According to New Report by VDC Security concerns are at the forefront as IoT connectivity comes to an increasing share of the world’s lifecrit

Add to Reading List

Source URL: www.vdcresearch.com

Language: English - Date: 2016-03-03 10:07:17
887Prevention / Security / Safety / Computer security / Cryptography / Data security / Information security / National security / Password

Manual for the Access to and Use of FaHCSIA Longitudinal Survey Datasets

Add to Reading List

Source URL: melbourneinstitute.com

Language: English - Date: 2014-02-26 18:10:16
888Computer access control / Cryptography / Computer security / Distance-bounding protocol / Security / Ubiquitous computing / Challengeresponse authentication / Radio-frequency identification / IP / Security token / NP / Cryptographic nonce

An RFID Distance Bounding Protocol Gerhard P. Hancke, Markus G. Kuhn University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK {gh275,mgk25}@cl.cam.ac.uk Abstract

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2005-11-25 11:04:54
889Computing / Directory services / French Revolution / Computer access control / Active Directory / Windows / Software / Email / French Directory / Apple Open Directory

*Form Valid UntilState Security Access Form Active Directory Account Manager Establishes a Manager to maintain Active Directory accounts (add/delete Active Directory accounts and modify email address).

Add to Reading List

Source URL: adedata.arkansas.gov

Language: English - Date: 2016-08-05 10:46:05
890Technology / Computing / Security / Industrial Internet Consortium / Cyberwarfare / IIC / Internet / Interoperability / Enterprise architecture framework / Computer security

Engineering: The First Steps PURPOSE AND AUDIENCE This document provides an overview of the scope, mission, and status of the engineering work of the Industrial Internet Consortium (IIC). There are four audiences for thi

Add to Reading List

Source URL: www.iiconsortium.org

Language: English - Date: 2016-07-25 11:57:01
UPDATE