Internet security

Results: 20779



#Item
351Software / Computer security / System software / Antivirus software / Proprietary software / Norton Internet Security / Benchmark / PCMark / Computer virus / Avira / Malware / Norton

Document: Authors: Company: Date: Edition: File:

Add to Reading List

Source URL: www.passmark.com

Language: English - Date: 2015-11-30 00:17:08
352

To learn more about the Industrial Internet Consortium’s approach to securing industrial systems, visit www.iiconsortium.org/wc-security Data from 2011 Repository of Industrial Security Incidents, www.risidata.com

Add to Reading List

Source URL: www.iiconsortium.org

- Date: 2016-07-25 11:57:01
    353Business / Computing / Technology / Industrial automation / Internet of Things / Predix / Technology forecasting / Customer experience management / Help desk / Computer security incident management / Technical support / General Electric

    Technical Support Policy Predix Platform Services You may receive technical support services from GE (“us” or “we”) for the Predix platform in three ways, as described below. DEFINITIONS: The following terms as u

    Add to Reading List

    Source URL: www.predix.io

    Language: English - Date: 2016-08-18 18:39:54
    354Cryptography / Public-key cryptography / Cryptographic software / Secure communication / Cryptographic protocols / Internet protocols / Transport Layer Security / NSA Suite B Cryptography / Cipher suite / OpenSSL / IPsec / SHA-1

    Microsoft PowerPoint - preneel_isse15_v1.pptx

    Add to Reading List

    Source URL: homes.esat.kuleuven.be

    Language: English - Date: 2015-11-15 11:53:49
    355Security / Cryptography / Prevention / Safety / Crime prevention / Information governance / National security / Computer security / Information security / Privacy / Internet of things / Encryption

    Spring 2016: ICS 695 – Advanced Special Topics in Security: Advanced Security and Privacy for Internet of Things and its Applications Time Monday & Wednesday, 12:00-01:15pm.

    Add to Reading List

    Source URL: www2.hawaii.edu

    Language: English - Date: 2015-10-29 18:36:38
    356Privacy / Data security / Identity documents / Internet privacy / Personally identifiable information / Computing / Gmail / Medical privacy / Government / Structure

    Privacy Policy Table of Contents 1. Purpose of Collection and Use of Personal Information 2. Range of Personal Information 3. Maintenance and Disuse of Personal Information 4. Range of Cookie Use

    Add to Reading List

    Source URL: www.icap2016.org

    Language: English - Date: 2016-03-14 20:28:10
    357Prevention / Security / Privacy / Human rights / Safety / Digital rights / Crime prevention / National security / Internet privacy / Information privacy / Surveillance / Mass surveillance

    June 17, 2013 6:13 pm Make privacy part of the transatlantic trade talks By Yochai Benkler

    Add to Reading List

    Source URL: renesmits.eu

    Language: English - Date: 2013-06-24 09:49:55
    358Computing / Software / System software / Embedded hypervisor / Hypervisor / Embedded system / Computer security / Wind River Systems / Internet of things

    Press Release One in Five Embedded Projects Now Integrating Virtualization, According to New Report by VDC Security concerns are at the forefront as IoT connectivity comes to an increasing share of the world’s lifecrit

    Add to Reading List

    Source URL: www.vdcresearch.com

    Language: English - Date: 2016-03-03 10:07:17
    359Technology / Computing / Security / Industrial Internet Consortium / Cyberwarfare / IIC / Internet / Interoperability / Enterprise architecture framework / Computer security

    Engineering: The First Steps PURPOSE AND AUDIENCE This document provides an overview of the scope, mission, and status of the engineering work of the Industrial Internet Consortium (IIC). There are four audiences for thi

    Add to Reading List

    Source URL: www.iiconsortium.org

    Language: English - Date: 2016-07-25 11:57:01
    360Software / Computing / Free software / Internet Standards / File Transfer Protocol / FileZilla / FTPS / Expect / Comparison of FTP client software

    Information on the state of FTP and available alternatives: Why You Should Replace Your Self-Hosted FTP Server Information on FTP security, management, access, scalability, and available alternatives.

    Add to Reading List

    Source URL: www.smartfile.com

    Language: English - Date: 2015-06-19 12:10:30
    UPDATE