Internet security

Results: 20779



#Item
101

Internet Security An “Edgy” Business Jaap Akkerhuis, NLnetLabs Daniel Karrenberg, RIPE NCC Overview

Add to Reading List

Source URL: nlnetlabs.nl

- Date: 2009-06-27 06:07:02
    102

    Towards Better Definitions and Measures of Internet Security (Position Paper) M. Mitzenmacher and D. Parkes Harvard University {michaelm,parkes}@eecs.harvard.edu

    Add to Reading List

    Source URL: cs-www.cs.yale.edu

    - Date: 2003-05-15 09:22:32
      103Internet privacy / Facebook / Data security / Facebook Beacon / Privacy / Medical privacy / Personally identifiable information / Beacon /  New York / Government / Politics / Computing

      Beacon Foundation Privacy Policy The Beacon Foundation ACN, a public company limited by guarantee ("Beacon" or "us" or "we" or "our") is committed to protecting your privacy. This policy explains how we manag

      Add to Reading List

      Source URL: beaconfoundation.com.au

      Language: English - Date: 2015-07-27 01:45:22
      104Password / Security / Prevention / Internet protocols / Safety / Computing / Internet Standards

      Microsoft Word - SIP2 Protocol Definition.doc

      Add to Reading List

      Source URL: developer.polarislibrary.com

      Language: English - Date: 2011-05-04 14:47:08
      105Computing / Internet / Network architecture / Internet protocols / Cryptographic protocols / Internet Standards / Tunneling protocols / Units of information / IPsec / Padding / Transport Layer Security / IPv4

      Attacking the IPsec Standards in Encryption-only Configurations Jean Paul Degabriele1 and Kenneth G. Paterson2 ?

      Add to Reading List

      Source URL: www.isg.rhul.ac.uk

      Language: English
      106Security / Computer security / Access control / Computer access control / Identity management / XACML / Authorization / Privacy / Information visualization / Internet privacy / Situation awareness

      Information Visualization for Rule-based Resource Access Control Jaime Montemayor, Andrew Freeman, John Gersh, Thomas Llanso, Dennis Patrone The Johns Hopkins University Applied Physics LaboratoryJohns Hopkins Roa

      Add to Reading List

      Source URL: cups.cs.cmu.edu

      Language: English - Date: 2006-06-02 15:04:21
      107Computing / Internet / Cryptographic protocols / Secure communication / Network architecture / Hypertext Transfer Protocol / Internet security / HTTPS / Crimeware / Internet privacy / Transport Layer Security / Bolt

      Fighting Crimeware: An Architecture for Split-Trust Web Applications Richard Sharp, Anil Madhavapeddy, Roy Want, Trevor Pering, John Light IRC-TR

      Add to Reading List

      Source URL: rich.recoil.org

      Language: English - Date: 2006-04-19 14:01:38
      108Privacy / Identity management / Privacy Office of the U.S. Department of Homeland Security / United States Department of Homeland Security / Business / Economy / Internet privacy / Privacy Impact Assessment / Chief privacy officer / Personally identifiable information / Management / Medical privacy

      UNITED STATES DEPARTMENT OF COMMERCE Chief Financial Officer and Assistant Secretary for Administration Washington, D.CNOV

      Add to Reading List

      Source URL: cio.noaa.gov

      Language: English - Date: 2015-09-25 15:57:53
      109Security / Human rights / Prevention / Identity management / Crime prevention / National security / Secure communication / Internet privacy / Mus / Privacy / Computer security

      MONTANA BOARD OF REGENTS OF HIGHER EDUCATION Policy and Procedures Manual SUBJECT: INFORMATION TECHNOLOGY PolicyPrivacy, Security, and Monitoring Approved: May 24, 2002; Revised: May 25, 2012

      Add to Reading List

      Source URL: mus.edu

      Language: English - Date: 2012-05-29 12:54:58
      110Computing / Prevention / Security / Crime prevention / Cryptography / Information governance / National security / Computer security / Information security / Security awareness / Data center / Internet

      Computer and Network Security Original Implementation: January 24, 1995 Last Revision: November 2, 2015 This policy establishes the conditions and security requirements for the use of computing equipment and networks at

      Add to Reading List

      Source URL: www.sfasu.edu

      Language: English - Date: 2016-07-26 16:47:37
      UPDATE