Internet security

Results: 20779



#Item
471Computing / Software / Security / Identity management / Law / Privacy / Internet privacy / Ubiquitous computing / Usability / Information privacy / Ambient intelligence / Medical privacy

A Usability Evaluation of a Home Monitoring System Rajah James Aleecia M. McDonald Robert McGuire

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-22 15:47:38
472Microsoft / Geography of California / Northern California / Internet privacy / Del Norte County /  California / Lake County /  California / Mendocino County /  California / Napa County /  California / Redwood Empire Food Bank / Privacy / HTTP cookie / Personally identifiable information

Privacy Policy and Security Our Commitment to Your Privacy and Security The Redwood Empire Food Bank (REFB) is committed to protecting your privacy and the security of your personal information. This Privacy Policy descr

Add to Reading List

Source URL: refb.org

Language: English - Date: 2016-01-26 11:48:51
473Cyberwarfare / Denial-of-service attacks / Internet Relay Chat / Computer network security / Security / Computing / Denial-of-service attack / DDoS mitigation / Computer security / Prolexic Technologies

DDoS Attack Mitigation Service Terms and Conditions The Sure DDoS Attack Mitigation Service provides the Customer with a solution to help protect the Customer site against Distributed Denial of Service (DDoS) attacks by

Add to Reading List

Source URL: web.sure.com

Language: English - Date: 2015-10-01 03:02:11
474Computer access control / Software / Computer security / Access control / FIPS 201 / PIV / Login / Single sign-on / Password / SharePoint

PIV Login Quick Reference Guide   PIV Users can only login with Internet Explorer What is PIV and who uses it?

Add to Reading List

Source URL: floodmaps.fema.gov

Language: English - Date: 2016-03-23 12:12:55
475Password / Security / Prevention / E-commerce / Internet marketing / Safety / Internet advertising / World Wide Web

Microsoft Word - Creating a GCKey and accessing the CHS Chart Registry Service and Digital Data Portal for the first time.docx

Add to Reading List

Source URL: www.charts.gc.ca

Language: English - Date: 2016-07-27 08:39:36
476Computing / Network architecture / Internet / World Wide Web / Internet protocols / Hypertext Transfer Protocol / Web development / Internet security / SPDY / HTTP/2 / HTTP pipelining / WebSocket

Can SPDY Really Make the Web Faster? 1 Yehia 1 Lancaster University, UK

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2014-04-01 09:22:42
477Computer security / Security / Cantons of Switzerland / Federated identity / Cybercrime / Digital technology / Identity / Identity management / Digital identity / World Economic Forum / Davos / Internet privacy

Special Side-Event at the World Economic Forum Davos, January 21, 2015 Digital Identities and Cyber Security in the New Global Context The Rise of Borderless Electronic Identities:

Add to Reading List

Source URL: www.iked.org

Language: English - Date: 2015-01-26 02:21:28
478Computer security / Software / Security / Computer network security / Crime prevention / National security / Antivirus software / Intrusion detection system / Avira / Center for Internet Security / Attack / Security alarm

ALDR: A New Metric for Measuring Effective Layering of Defenses ∗ Nathaniel Boggs Department of Computer Science Columbia University

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
479Computing / Network architecture / Computer network security / Tunneling protocols / Virtual private networks / Internet protocols / Cryptographic protocols / IPsec / Internet security / Transport Layer Security / SoftEther VPN / Secure Socket Tunneling Protocol

Security Review: SSL VPNs —Frederick M. Avolio Executive Summary Today’s enterprises use the Internet to meet a variety of communication needs among employees, business partners, suppliers, customers, and potential c

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2007-12-29 18:01:44
480Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Computer access control / Internet Standards / Internet protocols / Transport Layer Security / OpenSSL / Authentication / Password

eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirchen

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:18:07
UPDATE