Information security

Results: 50180



#Item
221

GAO, INFORMATION SECURITY: IRS Needs to Further Improve Controls over Financial and Taxpayer Data

Add to Reading List

Source URL: www.gao.gov

- Date: 2016-03-28 14:06:09
    222

    Security Controls in Third Party Agreement for Information Technology Related Services

    Add to Reading List

    Source URL: www2.polyu.edu.hk

    - Date: 2015-09-30 06:49:13
      223

      Mozilla Firefox Browser - Security Settings Overview The information below can help to resolve a wide range of security issues on our website when using the latest version of Mozilla Firefox. ‘Security Settings’ is a

      Add to Reading List

      Source URL: content001.bet365.com

      - Date: 2016-10-26 10:18:10
        224

        Security in MySQL Abstract This is the MySQL Security Guide extract from the MySQL 5.7 Reference Manual. For legal information, see the Legal Notices. For help with using MySQL, please visit either the MySQL Forums or

        Add to Reading List

        Source URL: downloads.mysql.com

        - Date: 2016-12-20 15:40:52
          225

          Computer Communication & Collaboration (Vol. 3, Issue 4, 2015) ISSNPrintOnline) Submitted on Nov. 21, 2015 (DOIC: Personal Information Security and the IoT: The Changing

          Add to Reading List

          Source URL: www.bapress.ca

          - Date: 2015-12-04 16:21:15
            226

            Merchant Security System Upgrade Guide Click HERE for information on SHA-256 compliance. Future-Proof Your Integration Global security threats are constantly changing, and the security of our merchants continues to be ou

            Add to Reading List

            Source URL: www.paypal-knowledge.com

            - Date: 2015-09-11 15:20:55
              227

              Information Security Baseline (minimal measures) 1 Version management

              Add to Reading List

              Source URL: media.leidenuniv.nl

              - Date: 2015-03-24 09:16:12
                228

                Formal Verification of Information Flow Security for a Simple ARM-Based Separation Kernel Mads Dam, Roberto Guanciale, Narges Khakpour, Hamed Nemati KTH Royal Institute of Technology SE, Stockholm, Sweden

                Add to Reading List

                Source URL: prosper.sics.se

                - Date: 2013-10-17 09:26:32
                  229

                  company fact sheet Making the World Safe for Exchanging Digital Information As a global leader in security, Trend Micro develops innovative security solutions that make

                  Add to Reading List

                  Source URL: www.trendmicro.com

                  - Date: 2013-06-03 08:16:12
                    230

                    Doctor Web – fact sheet Doctor Web – Russian developer of information security software branded Dr.Web® 1992

                    Add to Reading List

                    Source URL: st.drweb.co.jp

                    - Date: 2010-04-12 05:45:12
                      UPDATE