Cryptography

Results: 21893



#Item
531Cybercrime / Computing / Security / Crime / Identity theft / Social engineering / Cryptography / Crime prevention / Phishing / Password / Computer security / Security hacker

Defending Against Phishing & Social Engineering Attacks A Resource Guide from the PCI Security Standards Council Hackers use phishing and other social engineering methods to target organisations with legitimate-looking e

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2015-10-27 10:54:34
532Computer access control / Cryptography / Software / Password / Security / Cryptographic software / Random password generator / Passwd / Passphrase / Keeper / Crypt / KeePass

Central Connecticut State University Elihu Burritt Library Newsletter CRASH Shown at Burritt Library

Add to Reading List

Source URL: library.ccsu.edu

Language: English - Date: 2010-07-26 11:08:41
533IT risk management / Security / Information technology management / Computing / Disaster recovery / Data management / Backup / Cryptography / Emergency management / Computer security / Emergency communication system / Business continuity planning

SearchSMBStorage business continuity plan template

Add to Reading List

Source URL: www.clic.net

Language: English - Date: 2016-01-26 15:10:57
534Security / Computing / Privacy / Data security / Identity documents / Cryptography / National security / Internet privacy / Personally identifiable information / Email / Information privacy / Medical privacy

Terms and Conditions We hope that our limited edition print ordering service is straightforward to understand. To keep you in the picture about how we expect to do business, take a look through this section – if your q

Add to Reading List

Source URL: www.lukejerram.com

Language: English - Date: 2014-11-12 06:15:30
535Computer access control / Cryptography / Computer security / Prevention / Multi-factor authentication / Authentication / Financial technology / Password

CASE STUDY Cyber-security offering strong, cost effective two factor authentication. Small businesses

Add to Reading List

Source URL: www.digitalcatapultcentre.org.uk

Language: English - Date: 2016-03-09 06:12:58
536Computing / Wireless networking / Computer security / Cryptography / Computer network security / Extensible Authentication Protocol / Internet protocols / Wi-Fi / IEEE 802.1X / Xsupplicant / Authentication protocol / RADIUS

802.1x/EAP Authentication Guide RadiusNT/X V5.1 IEA Software, Inc. Administrative and Support Office PO BOX 1170

Add to Reading List

Source URL: www.iea-software.com

Language: English - Date: 2013-02-15 13:27:42
537Security / Cryptography / Cyberwarfare / Computer network security / Biological engineering / Body area network / Wireless networking / Internet privacy / Health informatics / Computer security / Encryption / Medical privacy

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-01-19 08:03:23
538Computing / Security / Policy / Crime prevention / Cryptography / Information governance / National security / Internet privacy / Privacy policy / Privacy / Computer security / Cloud computing

Embracing Policy Engineering Kathi Fisler Shriram Krishnamurthi Daniel J. Dougherty

Add to Reading List

Source URL: web.cs.wpi.edu

Language: English - Date: 2010-10-21 09:43:59
539Cryptography / Secure multi-party computation / Secure two-party computation / Ciphertext indistinguishability / Consensus / Secret sharing / IP / Control theory

MPC vs. SFE: Perfect Security in a Unified Corruption Model ? Zuzana Beerliov´a-Trub´ıniov´a, Matthias Fitzi, Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich {bzuzana,fitzi,hir

Add to Reading List

Source URL: www.cs.rpi.edu

Language: English - Date: 2011-02-19 14:29:40
540Security / National security / Prevention / Crime prevention / Cryptography / Information governance / Cyberwarfare / Computer security / Internal control / Information security / Cyber-security regulation

JH2015/005 2nd September 2015 JHC Cyber Risk Assessment Guidance Background checks: 1

Add to Reading List

Source URL: www.comitemaritime.org

Language: English - Date: 2015-09-14 04:38:33
UPDATE