Internet security

Results: 20779



#Item
301Computing / Technology / Media technology / Internet / E-commerce / Cultural globalization / New media / Telegraphy / Border Gateway Protocol / Telecommunication / Unique key / Electronic business

Objectives and added value of an Internet Key Figure System for Germany Sebastian Feld . Tim Perrei . Norbert Pohlmann . Matthias Schupp Institute for Internet Security Gelsenkirchen University of Applied Sciences {feld

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:19:09
302Internet privacy / Computing / Privacy / Data security / Computer security / HTTP cookie / Information privacy / Personal /  Inc. / Personally identifiable information / Medical privacy / P3P / Do Not Track legislation

Privacy Statement NBN International is committed to protecting the privacy of its customers and of visitors to its website(s). However, it is necessary to collect, store and share your personal data in order to provide

Add to Reading List

Source URL: www.nbninternational.com

Language: English - Date: 2016-08-18 10:00:56
303Computing / Software / Computer architecture / Smartphones / Mobile app / Google Play / Recommender system / Personal /  Inc. / Android / IOS / Internet privacy

Mobile App Recommendations with Security and Privacy Awareness Hengshu Zhu1 Hui Xiong2∗

Add to Reading List

Source URL: staff.ustc.edu.cn

Language: English - Date: 2014-11-13 08:20:35
304Malware / Marketing / Computer security / Adware / Advertising / Deception / Internet marketing / Malvertising / Online advertising / Trustwave Holdings

WHAT IS MALVERTISING? Malicious advertising (Malvertising) is a malware attack that uses online ads to spread malicious code HOW MALVERTISNG WORKS You visit a website with an infected banner

Add to Reading List

Source URL: ru.malwarebytes.com

Language: English - Date: 2016-05-10 23:15:51
305Computing / Computer access control / Computer security / Cryptography / Cryptographic protocols / Hypertext Transfer Protocol / Secure communication / Internet protocols / Transport Layer Security / Digest access authentication / Basic access authentication / Form-based authentication

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D1.1

Add to Reading List

Source URL: websand.eu

Language: English - Date: 2015-05-06 05:08:48
306P3P / World Wide Web / Internet privacy / Computing / Privacy / Identity management / Computer security / Cyberspace / CUPS / Privacy policy / HTTP cookie / Medical privacy

A “Nutrition Label” for Privacy Patrick Gage Kelley,* Joanna Bresee,* Lorrie Faith Cranor,* Robert W. Reeder** * Carnegie Mellon University School of Computer Science

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-06-17 17:35:23
307Computing / Computer access control / Software / Cryptography / Internet Explorer / Login / Password / Authentication / Transport Layer Security / HTTP cookie

Tel: E-mail: 1. DIGITAL CERTIFICATE AUTHENTICATION 1.a. Technical requirements 

Add to Reading List

Source URL: internetbanking.ro

Language: English - Date: 2014-11-05 04:27:13
308Aviation security / Security / Prevention / Economy / Registered Traveler / Transportation Security Administration / Electronic Privacy Information Center / Marc Rotenberg / No Fly List / Internet privacy / Privacy / Secondary Security Screening Selection

DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Docket Nos. TSAand TSA

Add to Reading List

Source URL: epic.org

Language: English - Date: 2009-09-07 14:27:58
309Security / Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / Information governance / National security / Computer virus / Intellectual property / Internet privacy / Website

TERMS The use of this website is subject to the following Terms, the Privacy Policy and any addi:onal terms and condi:ons and no:ces displayed by us on this website from :me to :me (together ‘Terms’). In the Terms, "

Add to Reading List

Source URL: yarrabend.com.au

Language: English - Date: 2016-06-17 02:00:37
310Network architecture / Computing / Internet / Internet Standards / Cryptographic protocols / Computer network security / Internet Protocol / TACLANE / IPv6 / Multiprotocol Label Switching / High Assurance Internet Protocol Encryptor / Router

Experiment Proposal Template

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2011-05-13 21:34:51
UPDATE