Data security

Results: 28926



#Item
621Security / Prevention / Cryptography / Safety / Crime prevention / Information governance / National security / Procore / Password / Computer security / Internet privacy / Encryption

Security Overview Understanding the need to address security concerns, Procore has created a multi-tiered approach to ensuring data security and application stability, both integral to maintaining the safekeeping of your

Add to Reading List

Source URL: procore.com

Language: English - Date: 2016-01-08 11:07:49
622Computer security / Prevention / Security / Data security / IT risk management / Management / Federal Information Security Management Act / Risk management / Vulnerability / Information security / Business continuity / Security controls

U.S. CONSUMER PRODUCT SAFTEY COMMISSION OFFICE OF INSPECTOR GENERAL FY 2015 FEDERAL INFORMATION SECURITY MANAGEMENT ACT REVIEW REPORT

Add to Reading List

Source URL: www.cpsc.gov

Language: English
623Identity management / Computer security / Computing / Data security / Federated identity / Meeco / Privacy / Personal /  Inc. / Internet privacy / Digital identity / Information technology management

PRESS RELEASE Meeco is winner of the IDentity Innovation award 2016. 15 June 2016, Meeco wins the identity innovation award 2016. The price for the

Add to Reading List

Source URL: www.idnext.eu

Language: English - Date: 2016-06-19 14:56:49
624Automatic identification and data capture / Ubiquitous computing / Privacy / Radio-frequency identification / Wireless / Computer access control / Cryptography / Molva / Authentication / Identification / Humancomputer interaction / Security

The Molva - Di Pietro scheme Problems with the identification Design flaws

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-10 03:06:40
625Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Data transmission / Handshaking / Network architecture / Authenticated encryption / Transport Layer Security

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer Christian Badertscher1, Christian Matt1, Ueli Maurer1, Phil Rogaway2, Björn Tackmann3 1ETH

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
626Computer security / Security / Prevention / Data security / National Institute of Standards and Technology / NIST Special Publication 800-53 / Federal Information Security Management Act / Security controls / Controlled Unclassified Information / NIST Cybersecurity Framework / Regulatory compliance / Information security

An Introduction to NIST Special Publicationfor Higher Education Institutions

Add to Reading List

Source URL: library.educause.edu

Language: English - Date: 2016-04-18 11:38:08
627Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Data security / High availability / Information security / Identity document / Business continuity planning

MOR Version 3 Consultation Feedback Issues Table

Add to Reading List

Source URL: www.arnecc.gov.au

Language: English - Date: 2015-12-09 20:42:34
628Computing / Wireless / Bluetooth / Humancomputer interaction / Bluesnarfing / Computer security / Kali Linux / Fitbit / Wearable technology / Kismet / Security token / Java APIs for Bluetooth

Security of Bluetooth Network Data Traffic Michael Grant Williams DoD Contractor Iowa State University

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2016-06-13 23:23:06
629Computing / Security / Cryptography / Data security / Information governance / Computer network security / Key management / Computer security / Apache Accumulo / Cloud computing security

Transitions A ROUNDUP OF LINCOLN LABORATORY TECHNOLOGY TRANSFER OPPORTUNITIES IN CYBER SECURITY Technology Transfer

Add to Reading List

Source URL: www.ll.mit.edu

Language: English - Date: 2016-07-12 15:25:15
630Economy / Money / Finance / Credit cards / Payment systems / E-commerce / Debit cards / Visa Inc. / Payment card / MasterCard / Payment Card Industry Data Security Standard / Cardholder Information Security Program

Microsoft Word - DataRequestForm.docx

Add to Reading List

Source URL: www.src.com

Language: English - Date: 2015-05-26 18:45:06
UPDATE