Internet security

Results: 20779



#Item
271Computing / Network architecture / Internet / Internet protocols / Tunneling protocols / Network address translation / IPsec / Computer network security / IP address / Multihoming / Internet protocol suite / Transmission Control Protocol

PDF Document

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2015-11-01 16:38:59
272Computer access control / Computer security / Computing / Security token / Multi-factor authentication / Authentication / RSA SecurID / Mutual authentication / OAuth / OpenID / Electronic authentication / Extensible Authentication Protocol

Bring Your Own Device For Authentication (BYOD4A) – The Xign–System Norbert Pohlmann . Markus Hertlein . Pascal Manaras Institute for Internet-Security Westphalian University of Applied Sciences {pohlmann | hertlein

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-11-20 14:35:18
273Internet privacy / Computing / HTTP cookie / Privacy / Personally identifiable information / Medical privacy / Computer security / Targeted advertising / Government

Learn, Knowledge-Base, Reward ____________________________________________________ PRIVACY POLICY Your Privacy is Important to Us We don’t ask you for personal information unless we truly need it. We don’t share your

Add to Reading List

Source URL: www.fustinobrothers.com

Language: English - Date: 2013-07-26 09:00:03
274Security / Education / E-commerce / Digital India / Internet in India / Ministry of Communications and Information Technology / Computer security / Educational technology / Gopal Khanna

7th Technology Summit – 2016 (Friday, the 23rd September, Hotel The Chancery Pavilion ,Residency Road, Bengaluru)

Add to Reading List

Source URL: www.varindia.com

Language: English - Date: 2016-07-29 02:02:07
275Internet privacy / P3P / World Wide Web / Identity management / Computing / Privacy / Privacy policy / FTC Fair Information Practice / Data security / Privacy law / Law / Medical privacy

Microsoft Word - 457_Draft.doc

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2006-05-18 18:32:58
276Computing / Technology / Wi-Fi / Computer network security / Mobile security / Hotspot / Internet of things / Mobile malware / Computer security / Devicescape / Android / MiFi

MayAn eBook from the editors of FierceWireless

Add to Reading List

Source URL: www.cloudmark.com

Language: English - Date: 2014-07-22 12:19:02
277Computer network security / Internet privacy / Network architecture / Smart card / Ubiquitous computing / Virtual private network / Computing / Technology / Humancomputer interaction

The use of smart cards in healthcare Working more secure and efficient with the UZIpas Central GP Service Drenthe can

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:42
278Computing / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Internet privacy / Cayuse / User / Point and click / Software / Computer security

UCI Cayuse 424 Quick Start Guide for Principal Investigator’s Professional Profile Getting Started Cayuse 424 is supported in recent versions of Firefox

Add to Reading List

Source URL: www.research.uci.edu

Language: English - Date: 2016-04-08 18:31:46
279Computing / Privacy / Internet privacy / Data security / Computer security / HTTP cookie / Information privacy / Personally identifiable information / Gmail / Medical privacy / P3P / Privacy concerns regarding Google

Privacy Policy A privacy policy states how you will respect the privacy of your website users. It says what information you will gather, how you will use it and how you will keep it secure. A privacy policy is a legal do

Add to Reading List

Source URL: www.lotuspetalfoundation.org

Language: English - Date: 2016-05-17 09:05:19
280Information privacy / Law / Privacy law / Data security / Information / Privacy / Data Protection Directive / Internet privacy / Medical privacy / EU-US Privacy Shield / International Safe Harbor Privacy Principles

CLIENT MEMORANDUM European Commission Approves Privacy Shield, Program Goes Live August 1 July 14, 2016

Add to Reading List

Source URL: www.willkie.com

Language: English - Date: 2016-07-14 12:21:14
UPDATE