Internet security

Results: 20779



#Item
551Security / Cyberwarfare / Computer security / Source / Crime prevention / Cryptography / Information governance / National security / Vulnerability / Internet privacy / Internet

This paper appears at the 24th USENIX Security SymposiumInvestigating the Computer Security Practices and Needs of Journalists Susan E. McGregor Tow Center for Digital Journalism Columbia Journalism School

Add to Reading List

Source URL: www.franziroesner.com

Language: English - Date: 2015-06-29 14:09:16
552Information science / Computing / Information retrieval / Data management / Cultural globalization / Digital technology / Internet / New media / Telegraphy / Research data archiving / Carl Malamud / National Security Agency

PDF Document

Add to Reading List

Source URL: public.resource.org

Language: English - Date: 2008-11-01 14:03:30
553Internet privacy / HTTP cookie / Privacy / Computing / Computer security / Politics

privacy policy our commitment to your privacy This site is owned and operated by Young Chef of the Year Pty Ltd (ABN). Young Chef of the Year Pty Ltd aim to provide their customers with confidence and are

Add to Reading List

Source URL: www.appetiteforexcellence.com

Language: English - Date: 2015-12-16 05:16:47
554Privacy / Data protection / Family Educational Rights and Privacy Act / Information privacy / United States Department of Education / Internet privacy / Government / Politics / Computer security / Liability and student records

Data Privacy and Disclosure Avoidance In the Education Data Warehouse (EDW) The federal Family Education Rights and Privacy Act (FERPA) requires that all personally identifiable student data be protected for public discl

Add to Reading List

Source URL: maine.gov

Language: English - Date: 2015-10-16 13:31:38
555Computing / Cryptography / Software / Red Hat / Free software / FreeIPA / Domain name system / Internet protocols / Security Identifier / IPA / Kerberos / Name server

FreeIPA Training Series FreeIPA v3: Trust Basic trust setup Sumit Bose

Add to Reading List

Source URL: www.freeipa.org

Language: English - Date: 2013-06-06 07:16:51
556Computing / Computer security / Cyberwarfare / Cryptographic protocols / Secure communication / Computer network security / Internet protocols / Computer access control / Cross-site scripting / Cheat sheet / Cross-site request forgery / Cheating in video games

OWASP Cheat Sheets Martin Woschek, April 9, 2015 Contents I

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-04-23 16:03:46
557Computing / Software / System software / Internet Protocol / Computer network security / Ping / Data security / TCP/IP stack fingerprinting / Cyberwarfare / Nmap / Raw socket / Internet protocol suite

Chatter on the Wire: A look at excessive network traffic and what it can mean to network security. by Eric Kollmann aka xnih v.1.0

Add to Reading List

Source URL: chatteronthewire.org

Language: English - Date: 2006-06-04 02:00:00
558Security / Computing / Privacy / Cybercrime / Internet privacy / Privacy policy / Medical privacy / Personally identifiable information / Terms of service / Computer security

TERMS OF USE .............................................................................................................................................. 1 PRIVACY ......................................................

Add to Reading List

Source URL: www.mcleboard.org

Language: English - Date: 2013-04-02 01:08:47
559Cryptography / Emerging technologies / Data security / Public key infrastructure / Public-key cryptography / Internet privacy / Communications protocol / Smart grid / Privacy / Key management / Data Encryption Standard

Fault-Tolerant Privacy-Preserving Statistics Marek Jawurek and Florian Kerschbaum SAP Research Karlsruhe, Germany {marek.jawurek|florian.kerschbaum}@sap.com

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2012-07-15 10:28:51
560Computer access control / Computer security / Computing / Electronic authentication / Security token / Authentication / Multi-factor authentication / OpenID / RSA SecurID / Mutual authentication / OAuth / SQRL

Bring Your Own Device For Authentication (BYOD4A) – The Xign–System Norbert Pohlmann  Markus Hertlein  Pascal Manaras Institute for Internet-Security Westphalian University of Applied Sciences {pohlmann | hertl

Add to Reading List

Source URL: www.xignsys.com

Language: English - Date: 2016-03-13 15:17:18
UPDATE