Internet security

Results: 20779



#Item
491Law / Data security / Data protection / Privacy / Information privacy / Electronic Privacy Information Center / Politics and technology / Health Insurance Portability and Accountability Act / Notice of proposed rulemaking / Public Responsibility in Medicine and Research / De-identification / Internet privacy

Comments of THE ELECTRONIC PRIVACY INFORMATION CENTER (EPIC) to DEPARTMENT OF HEALTH AND HUMAN SERVICES [Docket ID: HHS-OPHSHuman Subjects Research Protections: Enhancing Protections for Research Subjects and

Add to Reading List

Source URL: epic.org

Language: English - Date: 2016-02-22 14:56:26
492Internet / Computing / Cryptography / Internet Standards / Internet protocols / Domain name system / DNSSEC / Public-key cryptography / Domain Name System Security Extensions / DNS spoofing / NSD / Comparison of DNS server software

DNSSEC Raising the Barriers against DNS exploits Olaf M. Kolkman ()

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:03
493Computer access control / Computer security / Computing / Computer network security / Federated identity / Wireless networking / Internet protocols / Authentication / IEEE 802.1X / RADIUS / Single sign-on / Mutual authentication

Secure Authentication System for Public WLAN Roaming ‡ Yasuhiko Matsunaga †

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-05-10 19:56:51
494Biometrics / Security / Prevention / Identification / Safety / Federal Bureau of Investigation / Law enforcement in the United States / Surveillance / Fingerprint / Integrated Automated Fingerprint Identification System / Internet privacy / Privacy

PDF Document

Add to Reading List

Source URL: cdt.org

Language: English - Date: 2016-07-07 11:48:06
495Network architecture / Network address translation / Computing / Network protocols / Computer network security / Internet protocols / Traversal Using Relays around NAT / STUN / NAT traversal / Session Initiation Protocol

Introduction to the IETF ICE/TURN/STUN set of RFCs Emil Ivov, Pal Martinsen, Justin Uberti & Brandon Williams IETF 92 Copyright (cIETF Trust and the persons identified as the document authors

Add to Reading List

Source URL: ietf.org

Language: English - Date: 2015-07-07 02:17:33
496Computing / Technology / Digital media / Spamming / Email / Emtel / Email spam / Acceptable use policy / Internet privacy / Internet / Privacy / Computer security

FAIR USAGE POLICY The following Policy relates to your use of CANALBOX internet services only. It is designed to make sure we can give you Services that are fast and reliable. You must make sure that any use of the Serv

Add to Reading List

Source URL: www.canalplus-maurice.com

Language: English - Date: 2015-07-21 11:00:18
497Computing / Network architecture / Computer network security / IP addresses / Routing / Internet Standards / Network address translation / Port forwarding / Dynamic Host Configuration Protocol / Firewall / Private network / Iptables

1:1 NAT in ZeroShell Requirements The version of ZeroShell used for writing this document is Release 1.0.beta11. This document does not describe installing ZeroShell, it is assumed that the user already has a configured,

Add to Reading List

Source URL: www.zeroshell.net

Language: English - Date: 2011-12-28 16:43:31
498Security / Prevention / Safety / Crime prevention / Physical security / Public safety / Security guard / Surveillance / Email / Internet

Texas Department of Public Safety Regulatory Services Division PRIVATE SECURITY  MUST USE MOST CURRENT FORM

Add to Reading List

Source URL: www.txdps.state.tx.us

Language: English - Date: 2016-08-01 15:35:12
499Software / Computing / Web browsers / Mozilla / Internet advertising / Hacking / Cloud clients / Browser extension / Google Chrome / Browser security / Cross-site scripting / Firefox

2015 IEEE Symposium on Security and Privacy Ad Injection at Scale: Assessing Deceptive Advertisement Modifications  

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:06
500Computing / Security / Prevention / Bitcoin / Crime prevention / Cryptography / Information governance / National security / Computer security / Internet of things / Cloud computing / Blockchain

EEMA online March 2016 Issue 5 Diary dates 2016 Below are some of the events that we are holding this year. Be sure to bookmark them now! For further information visit www.eema.org/events. 19 April

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:09
UPDATE