Digital security

Results: 4317



#Item
541Data security / Actuarial science / Computer security / Business software / TRAC / Information security / Risk management / Health Insurance Portability and Accountability Act / Risk / Security / Management / Public safety

Identifying and Managing Third Party Data Security Risk Digital Commerce & Payments Series Webinar April 29, 2015

Add to Reading List

Source URL: www.buckleysandler.com

Language: English - Date: 2015-04-29 16:36:23
542Email / Technology / Digital media

NASIS – District Edition (NASIS-DE) District/School System Security Administrator Designation Form (v5____________________________________________________.

Add to Reading List

Source URL: www.bie.edu

Language: English
543Computer law / International trade / Law / Privacy / Internet privacy / Network neutrality / Free trade / Consumer protection / Computer security / Business / Ethics / Identity management

THE DIGITAL DOZEN The Obama Administration’s digital trade policy is anchored in principles that secure and protect innovation, a free and open Internet, and commerce without barriers.

Add to Reading List

Source URL: ustr.gov

Language: English - Date: 2015-05-01 10:20:41
544Digital rights management / InterTrust Technologies / Digimarc / Rovi Corporation / Secure Computing / Verisign / SonicWALL / Symantec / Updata / Cryptography / Computing / Computer security

Security Brief Friday May 31, 2002 Company News Recent Investments Securify (network monitoring) $13m B

Add to Reading List

Source URL: signalhill.in

Language: English - Date: 2013-09-25 15:28:43
545Notary / Digital signature / Key management / Public-key cryptography / Signature / Time signature / Type signature / Email / Logo / Cryptography / Electronic documents / Security

Microsoft Word - Sig Logo Order Form.doc

Add to Reading List

Source URL: schedulestar.com

Language: English - Date: 2015-02-10 15:39:47
546Electronics / Computer security incident management / Email / Technology / Digital media

IT Asset Incident Report This report must be completed and forwarded to your CIO/IT Manager within 24 hours of the incident or next business day.

Add to Reading List

Source URL: www.doit.state.nm.us

Language: English - Date: 2011-05-25 15:28:48
547HTTP / Internet / Human–computer interaction / Information Age / Web page / HTTP Secure / Hypertext Transfer Protocol / Session Initiation Protocol / Proxy server / World Wide Web / Computing / Digital media

Keyless Media Delivery and Security Location-aware computing through Interaction Design David A. Shamma, Kristian J. Hammond, and Nader Varjavand ? Intelligent Information Laboratory, Northwestern University, 1890 Maple

Add to Reading List

Source URL: infolab.northwestern.edu

Language: English - Date: 2011-04-14 17:04:31
548Electronic commerce / Cryptographic protocols / Secure communication / Root certificate / Public key certificate / HTTP Secure / Transport Layer Security / X.509 / Certificate authority / Cryptography / Public-key cryptography / Key management

Understanding Digital Certificates & Secure Sockets Layer

Add to Reading List

Source URL: www.jma.duq.edu

Language: English - Date: 2010-03-11 15:04:34
549Malware / Spamming / Whitelist / Internet / Technology / Electronics / Antivirus software / Digital media / Computer security

fragFINN The website fragFINN.de offers children their own space on the Internet where they

Add to Reading List

Source URL: www.fragfinn.de

Language: English - Date: 2011-10-05 06:29:12
550Unemployment in the United States / Independent living / Disability / Medicine / Texas Department of Assistive and Rehabilitative Services / Health / Florida Division of Vocational Rehabilitation / Disability rights / Social Security / Ticket to Work

Disabled woman with Digital Tablet

Add to Reading List

Source URL: vadars.org

Language: English - Date: 2014-04-02 11:48:23
UPDATE