Internet security

Results: 20779



#Item
401Broadband / Economy / Structure / Technology / National Telecommunications and Information Administration / Innovation / Internet access / Competitiveness / Sustainability / National broadband plan / Broadband universal service

“The vows of this nation can only be fulfilled if we are first, and therefore, we intend to be first. Our leadership in science and in industry, our hopes for peace and security, our obligations to ourselves as well as

Add to Reading List

Source URL: www.democraticleader.gov

Language: English - Date: 2016-02-02 12:39:28
402Computing / Cryptography / Internet / Secure communication / Internet Standards / Internet protocols / Cryptographic protocols / E-commerce / Transport Layer Security / Cipher suite / Handshaking / Transmission Control Protocol

Network Working Group Request for Comments: 4346 Obsoletes: 2246 Category: Standards Track T. Dierks

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-02-04 15:25:49
403Government / Human rights / Digital rights / Intelligence sharing / Privacy / Fusion center / Nationwide Suspicious Activity Reporting Initiative / Internet privacy / Information Sharing Environment / Regulatory compliance / United States Department of Homeland Security / Civil liberties

N T OF J United States Department of Justice

Add to Reading List

Source URL: www.ncirc.gov

Language: English - Date: 2010-07-02 16:40:25
404Computing / Transmission Control Protocol / Computer network security / Communications protocol / Network performance / Flow control / Multipath TCP / Internet protocol suite

TURN TCP [draft-ietf-behave-turn-tcp-02] Simon Perreault Viagénie

Add to Reading List

Source URL: www.viagenie.ca

Language: English - Date: 2009-03-25 11:21:45
405Microsoft / Software / Computing / Email / End user / Outlook.com / Internet privacy / Dialog box

Improving Security Decisions with Polymorphic and Audited Dialogs José Carlos Brustoloni and Ricardo Villamarín-Salomón Department of Computer Science University of Pittsburgh

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-05-29 23:53:14
406Digital rights management / Malware / Computer security / Internet advertising / Computer network security / Identity theft / Rogue software / Spyware / Internet privacy / Origin / Web browser / Application software

Downloadable Software Guidelines Funmoods is committed to ethical standards for downloadable Downloadable Software Application ("Downloadable Software Application") and follows these guidelines: • No Downloadable Soft

Add to Reading List

Source URL: www.funmoods.com

Language: English - Date: 2013-01-24 10:11:01
407Security / Cyberwarfare / Prevention / Technology / Cybercrime / National security / Norbert Pohlmann / E-commerce / Emerging technologies / Internet / Computer security / Privacy

Welcome to ISSE / OID 2015 Norbert Pohlmann Chairman: IT security association TeleTrusT Professor: Westphalian University of Applied Sciences Director:

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-11-26 09:39:11
408Types of insurance / Liability / Economy / Finance / Cyber-Insurance / Internet security / Liability insurance / Insurance / Professional liability insurance

Contact: Michelle Voli External Communications Specialist

Add to Reading List

Source URL: www.phly.com

Language: English - Date: 2016-08-01 11:29:14
409Law / Digital rights / Human rights / Privacy / Privacy law / United States Department of Homeland Security / Politics / 93rd United States Congress / Privacy Act / Privacy Office of the U.S. Department of Homeland Security / Electronic Privacy Information Center / Internet privacy

DEPARTMENT OF HOMELAND SECURITY United States Customs and Border Protection Docket No. DHS

Add to Reading List

Source URL: epic.org

Language: English - Date: 2009-09-07 00:48:40
410Information privacy / Computing / Law / Privacy / Computer security / Internet privacy / HTTP cookie / Personally identifiable information / Personal Information Protection and Electronic Documents Act / Medical privacy / Data Protection Act / Data protection (privacy) laws in Russia

INFORMATION SHEET ACCORDING TO ARTICLE 13 OF THE LEGISLATIVE DECREEPersonal Information Protection Act) WHO PROCESSES THE INFORMATION (“HOLDER”) The personal information that can be processed is the person

Add to Reading List

Source URL: dynamicloset.com

Language: English - Date: 2015-09-29 03:26:21
UPDATE