Internet security

Results: 20779



#Item
201Network architecture / Internet Protocol / Computing / Broadband / IPv4 / IPv6 / Internet / Carrier-grade NAT / Residential gateway / Voice over IP / IPv4 address exhaustion / 6to4

COLUMNS Balkanization from Above DAN GEER AND HD MOORE Dan Geer is the CISO for In-Q-Tel and a security

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 16:26:00
202Data security / Policy / Privacy policy / Internet privacy / Personally identifiable information / Privacy / Medical privacy / Government / Computing / Politics

California Department of Social Services (CDSS) PRIVACY NOTICE The CDSS Privacy Notice explains how personal information is collected and maintained when completing applications or forms (online or hardcopy). Personal

Add to Reading List

Source URL: secure.dss.ca.gov

Language: English - Date: 2015-10-28 18:11:18
203Data security / Internet privacy / Privacy / Data protection / Identity management / Computing / Computer security / HTTP cookie / Information privacy / Web portal / Directive on Privacy and Electronic Communications / Data Protection Act

PRIVACY POLICY for the portal http://infoshare.pl (also published as http://theinfoshare.org) § 1. General provisions 1. This Privacy Policy sets forth the rules for the processing and protection of personal data of Por

Add to Reading List

Source URL: infoshare.pl

Language: English - Date: 2016-02-08 04:34:19
204Computer security / Cyberwarfare / Security / Computer network security / Hacking / Cybercrime / Advanced persistent threat / Espionage / Trend Micro / Zero-day / Targeted threat / Internet security

Detecting the Enemy Inside the Network: How tough is it to Deal with APTs?

Add to Reading List

Source URL: about-threats.trendmicro.com

Language: English - Date: 2013-04-19 02:52:06
205Computing / Network architecture / Internet / Smart cards / Internet protocols / Internet Standards / Cryptographic protocols / Network protocols / Subscriber identity module / Universal Integrated Circuit Card / Transport Layer Security / Hypertext Transfer Protocol

SCWS_SteppingStones_2009_v1.0.0

Add to Reading List

Source URL: simalliance.org

Language: English - Date: 2015-03-26 18:46:30
206Information privacy / Human rights / Data mining / Information / Data security / Privacy / Internet privacy / Data Protection Directive / Intellectual property / Computing

– Grant Agreement noD5.2 – Legal and ethical issues regarding data warehouse Deliverable No. 5.2 Report on Legal and Ethical Issues Regarding Data Warehouse, Data

Add to Reading List

Source URL: p-medicine.eu

Language: English - Date: 2013-08-09 04:11:27
207Computing / Internet privacy / Law / Computer security / Information privacy / Privacy policy / Privacy / HTTP cookie / Medical privacy / Personal /  Inc. / Data Protection Act / P3P

PRIVACY POLICY BACKGROUND: This Policy applies as between you, the User of this Website and Call Print Group Limited the owner and provider of this Website. This Policy applies to our use of any and all Data collected by

Add to Reading List

Source URL: www.callprint.co

Language: English - Date: 2015-07-20 10:13:05
208Computing / Security / Secure communication / Cyberwarfare / Computer security / Information privacy / Human rights / Data protection / Internet privacy / Privacy / Data mining / Internet security

Large-Scale Collection and Sanitization of Network Security Data: Risks and Challenges∗ (position paper) Phillip Porras Vitaly Shmatikov

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2006-07-31 13:42:23
209Privacy / Human rights / Government / Law / Privacy Commissioner / Data security / Complaint / Privacy policy / Internet privacy / Cause of action / Information privacy / Medical record

DPCD Privacy Complaint Procedure and Form Introduction

Add to Reading List

Source URL: planning-schemes.delwp.vic.gov.au

Language: English - Date: 2014-06-21 22:39:54
210Software / System software / Computing / Rogue software / Computer viruses / Deception / Internet security / Macro virus / Spyware / Antivirus software / Microsoft Windows / File dialog

Polaris: Usable Virus Protection for Windows Ka-Ping Yee Marc D. Stiegler, Alan H. Karp, Tyler Close Mark S. Miller

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-06-21 09:58:18
UPDATE