Defensive computing

Results: 75



#Item
31Computing / Cyberwarfare / Vulnerability / Electronic voting / Security testing / Social vulnerability / Voting machine / Defensive programming / Code review / Software testing / Computer security / Security

The Red Team penetration test for the InkaVote Plus was conducted by

Add to Reading List

Source URL: votingsystems.cdn.sos.ca.gov

Language: English - Date: 2014-12-02 18:09:34
32Malware / Cybercrime / Smartphone / IOS jailbreaking / Mobile device / Phishing / Mobile business intelligence / Defensive computing / Information appliances / Computing / Technology

Microsoft Word[removed]template.docx

Add to Reading List

Source URL: www.nd.gov

Language: English - Date: 2014-05-30 15:42:48
33Computer network / Telecommunications engineering / Internet / Password / Defensive computing / Network security / Digital media / Technology / Email

Microsoft Word - StudentInternetUseAgreement EN_1

Add to Reading List

Source URL: m.pickenstech.org

Language: English - Date: 2013-08-05 18:58:29
34Spamming / Internet / Spam filtering / Phishing / Social engineering / Computer virus / Antivirus software / Instant messaging / Defensive computing / Email / Computer-mediated communication / Computing

UNCLASSIFIED NCCIC ADVISORY National Cybersecurity & Communications Integration Center 2 MAY 2011 – 1400: OSAMA BIN LADEN – THEMED PHISHING

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-10-07 21:38:32
35Identifiers / Application programming interfaces / Extensible Provisioning Protocol / Object identifier / Document Object Model / JavaScript / Computing / Domain name system / Software engineering

EXTENSIBLE PROVISIONING PROTOCOL MAPPING: Version 1.2

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2012-07-12 13:40:02
36Computer network / Technology / Password / Electronics / Network security / Defensive computing / Digital media / Internet privacy / Internet

6086 in process[removed]docx

Add to Reading List

Source URL: www.nhcs.net

Language: English - Date: 2013-09-09 16:46:44
37Cyberwarfare / Crime prevention / National security / Computer security / Internet privacy / Password / Spyware / Malware / Defensive computing / Computer network security / Security / Espionage

PERSONNEL, NEBRASKA STATE COLLEGES POLICY: 5008 Employee Use of Campus Computers Page 1 of 4 ______________________________________________________________________________

Add to Reading List

Source URL: www.csc.edu

Language: English - Date: 2008-10-07 16:18:23
38Computer law / Legal aspects of computing / Defensive computing / Computing / Internet privacy / Shared resource

IT Use Guideline - Computer and Network Use General Guidelines

Add to Reading List

Source URL: oit.ua.edu

Language: English - Date: 2014-08-19 12:15:22
39Military communications / Computer security / Security / Global Information Grid / Critical infrastructure protection / Defense Science Board / Red team / Information assurance / Information Assurance Technology Analysis Center / National security / Military science / Grid computing

Protecting the Homeland Report of the Defense Science Board Task Force on DEFENSIVE INFORMATION OPERATIONS 2000 Summer Study

Add to Reading List

Source URL: www.au.af.mil

Language: English - Date: 2012-01-04 10:15:03
40Malware / Computer crimes / Software / IOS jailbreaking / Android / Phishing / Defensive computing / Web threat / Smartphones / Cybercrime / Computing

May 2014 Volume 9, Issue 5 Protecting Against Mobile Malware Department of Accounting and General Services (DAGS)

Add to Reading List

Source URL: ags.hawaii.gov

Language: English - Date: 2014-05-29 16:09:38
UPDATE