Digital security

Results: 4317



#Item
321Cryptography / Internet / Computing / Key management / Internet protocols / Internet Standards / Domain name system / Public-key cryptography / Domain Name System Security Extensions / Digital signature / Zone file / Key

.ca Signing Metrics R. Gieben∗ NLnet Labs May 2, 2006 NLnet Labs document

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:06:52
322Internet privacy / Privacy / Computing / Identity management / Facebook / Computer security / Digital media / HTTP cookie / Personally identifiable information / Medical privacy / Facebook Beacon / In re Gateway Learning Corp.

Privacy Policy This Privacy Policy was last revised on December 10, 2015. Infinidat, Inc. ("Company") is committed to protecting your privacy. We have prepared this Privacy Policy to describe to you our practices regardi

Add to Reading List

Source URL: www.infinidat.com

Language: English - Date: 2015-12-24 09:28:33
323

Reinforcing Trust and Security in Digital Services and in the Handling of Personal Data Anna Tikhomirova, Mark Lavrentev Tyumen State University, Institute of State and Law

Add to Reading List

Source URL: iele.weebly.com

Language: English - Date: 2016-03-24 07:44:38
    324Avionics / Embedded systems / Safety engineering / Software requirements / Electronic design / DO-178B / DO-254 / Computer security / Software / Configuration management / Reverse engineering / Federal Aviation Administration

    Reverse Engineering for Software and Digital Systems

    Add to Reading List

    Source URL: www.tc.faa.gov

    Language: English - Date: 2016-02-25 11:33:37
    325Cryptography / Computer access control / Computer security / Certificate authority / IdenTrust / Identity theft / Digital identity / Multi-factor authentication / Authentication / Smart card / E-commerce / Health Insurance Portability and Accountability Act

    The Payment Factory: Strengthening Compliance and Improving Internal Controls for Corporate Treasurers IdenTrust

    Add to Reading List

    Source URL: www.identrust.com

    Language: English - Date: 2012-07-10 20:41:47
    326Data security / Computing / Prevention / Government / Privacy / Digital rights / Human rights / Internet privacy / Privacy Office of the U.S. Department of Homeland Security / Medical privacy / Information security / Personally identifiable information

    Privacy Impact Assessment for MCC Public Website Submitted by: Dennis Lauer, Chief Privacy Officer Millennium Challenge Corporation (MCC) 875 15th Street N.W. Washington, DC 20005

    Add to Reading List

    Source URL: assets.mcc.gov

    Language: English - Date: 2015-02-06 12:29:22
    327Computing / Smartphones / Computer hardware / Software / Android / Secure Digital / Factory reset / Nexus One / HTC Desire / MultiMediaCard / HTC One / Trim

    Security Analysis of Android Factory Resets Laurent Simon University of Cambridge Ross Anderson

    Add to Reading List

    Source URL: ieee-security.org

    Language: English - Date: 2015-05-20 23:58:44
    328

    The SmartLogic Tool: Analysing and Testing Smart Card Protocols Gerhard de Koning Gans, Joeri de Ruiter Digital Security, Radboud University Nijmegen The SmartLogic Tool

    Add to Reading List

    Source URL: www.spacios.eu

    Language: English - Date: 2012-04-21 16:10:01
      329

      TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 1 Humans Are Easily Fooled by Digital Images

      Add to Reading List

      Source URL: arxiv.org

      Language: English - Date: 2015-09-17 20:25:14
        330

        — Solution White Paper Breakthrough Security and Compliance Practices for the Digital Enterprise

        Add to Reading List

        Source URL: www.ciosummits.com

        Language: English - Date: 2015-09-22 18:29:07
          UPDATE