Computer security

Results: 47159



#Item
981Security / Prevention / Safety / Government procurement in the United States / Computer security / Crime prevention / Contract law / Systems engineering / General contractor / Performance work statement / Statement of work / Subcontractor

NLKNPO NOAALink_Peformance_Work_Statement(PWS)Template.docx

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2014-11-18 14:50:21
982Jewish surnames / Security / Surname / Simson Garfinkel / Cryptography / Crime prevention / Information governance / National security / Garfinkel / Simson / Computer security

Introduction to Computer Security and Privacy Simson L. Garfinkel, Ph.D. http://www.simson.net/

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-06-21 11:48:48
983Housing in the United Kingdom / Economy / Real estate / United Kingdom / Estate agent / The Property Ombudsman / National Approved Letting Scheme / Letting agent / Association of Residential Letting Agents / Insurance / Property management / Computer security

WWW .theprs.co.uk @PropertyRedress

Add to Reading List

Source URL: www.theprs.co.uk

Language: English - Date: 2016-01-19 09:22:34
984Security / Kratos / Computing / God of War / Modem / Computer security

March 7, 2016 Kratos Selected as TT&C Modem Provider by Strategic South Asian Space Agency SAN DIEGO, March 07, 2016 (GLOBE NEWSWIRE) -- Kratos Defense & Security Solutions, Inc. (Nasdaq:KTOS), a leading National Securi

Add to Reading List

Source URL: www.rtlogic.com

Language: English - Date: 2016-08-09 00:32:40
985Computer access control / Password / Security / Email / Prevention / Safety / Federated identity

Online Grants System Tutorial Module 1 Creating a Profile and Setting Up an Organization

Add to Reading List

Source URL: www.azhumanities.org

Language: English - Date: 2015-10-12 12:33:53
986Security / Computer security / Identity management / Information technology management / Computer access control / Prevention / Access control / Provisioning / Business process management / User provisioning software / Aveksa

Fischer Identity™ Turn Identity Management into a Strategic Advantage Self-Service Portal

Add to Reading List

Source URL: www.fischerinternational.com

Language: English - Date: 2012-05-11 12:48:40
987Computer access control / Obfuscation / Prevention / Password / Security / Passwd / Identity management / Cryptographic software

March 17, 2016 MEMORANDUM FOR: GOES DCS LRGS Data Users

Add to Reading List

Source URL: dcs4.noaa.gov

Language: English - Date: 2016-03-24 15:28:31
988Computing / Software / Computer architecture / Smartphones / Mobile device management / Wi-Fi / Computer security / Mobile app / Android / IOS / Mobile security / Mobile business intelligence

Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Devices A SANS Whitepaper Written by Lee Neely February 2016

Add to Reading List

Source URL: cg9j53d64gz46qncx41jvxq16p-wpengine.netdna-ssl.com

Language: English - Date: 2016-06-14 09:44:32
989Prevention / Health / Department of Health / Philippine Health Insurance Corporation / Computing / Computer security / Data security / Security / Electronic health record / HCIS / Personal health record / Xerox Star

PDF Document

Add to Reading List

Source URL: www.philhealth.gov.ph

Language: English - Date: 2016-08-16 22:19:53
990Computing / Transmission Control Protocol / Computer network security / Communications protocol / Network performance / Flow control / Multipath TCP / Internet protocol suite

TURN TCP [draft-ietf-behave-turn-tcp-02] Simon Perreault Viagénie

Add to Reading List

Source URL: www.viagenie.ca

Language: English - Date: 2009-03-25 11:21:45
UPDATE