Defensive computing

Results: 75



#Item
41Electronics / Acceptable use policy / Computer security / Etiquette / Internet / Internet culture / Peer-to-peer / Computer literacy / Defensive computing / Computing / Email / Digital media

South College Computing Code of Ethics

Add to Reading List

Source URL: www.southcollegetn.edu

Language: English - Date: 2014-08-01 12:14:30
42Spamming / Internet / Spam filtering / Phishing / Social engineering / Computer virus / Antivirus software / Instant messaging / Defensive computing / Email / Computer-mediated communication / Computing

UNCLASSIFIED NCCIC ADVISORY National Cybersecurity & Communications Integration Center 2 MAY 2011 – 1400: OSAMA BIN LADEN – THEMED PHISHING

Add to Reading List

Source URL: www.pld.com

Language: English - Date: 2013-09-20 15:05:07
43Antivirus software / Rogue software / Scareware / Spyware / Computer virus / Defensive computing / MS Antivirus / Malware / System software / Software

Fight-Against-Malware _3_

Add to Reading List

Source URL: www.its.ms.gov

Language: English - Date: 2014-09-19 10:01:21
44Computer virus / Server / Computing / Computer security / System software / Password strength / Defensive computing / Password / Operating system / User

Collegiate Computer User Code of Ethics[removed]The purpose of the Code of Ethics is to promote responsible, ethical and secure use of the computing facilities provided by the University of Winnipeg and the Collegia

Add to Reading List

Source URL: collegiate.uwinnipeg.ca

Language: English - Date: 2012-02-15 14:18:16
45Malware / Smartphone / IOS jailbreaking / Phishing / Near field communication / Opera / Internet security / Defensive computing / Mobile virus / Software / Computing / Antivirus software

From the Desk of [Insert Name Here] Is Malware a Threat to Mobile Devices? The volume of cyber threats to mobile computing devices continues to increase as new applications and devices proliferate. McAfee reports there

Add to Reading List

Source URL: www.dhses.ny.gov

Language: English - Date: 2014-07-08 09:23:54
46Malware / Software / Computer virus / Antivirus software / Spyware / SAP AG / Defensive computing / Espionage / Computer network security / Cyberwarfare

STANDARD ADMINISTRATIVE PROCEDURE[removed]M1.23 Information Resources – Malicious Code Approved July 18, 2005 Revised February 24, 2009

Add to Reading List

Source URL: rules-saps.tamu.edu

Language: English - Date: 2014-03-04 12:38:17
47System software / Antivirus software / Malware / Android / IOS jailbreaking / Rooting / Defensive computing / Mobile business intelligence / Computing / Software / Smartphones

May 2014 Volume 9, Issue 5 Protecting Against Mobile Malware Enterprise Security and Risk Management Office Monthly Security Tips

Add to Reading List

Source URL: www.esrmo.scio.nc.gov

Language: English - Date: 2014-06-02 11:43:47
48Computer network / Telecommunications engineering / Internet / Password / Defensive computing / Network security / Digital media / Technology / Email

Microsoft Word - StudentInternetUseAgreement EN_1

Add to Reading List

Source URL: www.pickenstech.org

Language: English - Date: 2013-08-05 18:58:29
49Antivirus software / Computing / Backup / Spyware / Email / Phishing / Computer virus / Adware / Defensive computing / Internet / Espionage / Malware

University of Manitoba Research Suggested Practices for IT Written by Trevor Mazak September 10, 2013 Last Revised September 16, 2013 Notice: The contents of this document are highly time sensitive. Best practices today

Add to Reading List

Source URL: www.umanitoba.ca

Language: English - Date: 2014-09-04 10:16:43
50National Safety Council / Form / Computing / Software / Defensive driving / Risk management / Password

USDA Forest Service – R1 Employees LOGIN INSTRUCTIONS TO ACCESS NATIONAL SAFETY COUNCIL’S DEFENSIVE DRIVING COURSE

Add to Reading List

Source URL: gacc.nifc.gov

Language: English - Date: 2014-07-12 14:25:54
UPDATE