Internet security

Results: 20779



#Item
571Computing / Internet / E-commerce / Internet security / Secure communication / Transport Layer Security / Server / Network architecture

Jarrett & Lam Limited The Laurels, 75 Reigate Road, Hookwood, Surrey RH6 0HL www.jarrettandlam.com Terms and Conditions for operating Vacancy Lab on a cloud server or over the internet.

Add to Reading List

Source URL: www.vacancylab.com

Language: English - Date: 2015-12-18 09:30:09
572Internet privacy / Computing / Law / Privacy / Computer security / Identity management / Medical privacy / Personally identifiable information / HTTP cookie / Privacy concerns with social networking services / P3P

  DEXTERITY VENTURES PRIVACY POLICY Dexterity Ventures Inc. (“​ Dexterity​ ”/“​

Add to Reading List

Source URL: dexterityventures.com

Language: English - Date: 2016-03-24 13:33:27
573Privacy of telecommunications / Technology / Prevention / National security / Computer network / Telephone tapping / Electronic Communications Privacy Act / Surveillance / Privacy / Internet / Pen register / Lawful interception

IT’S TOO COMPLICATED: THE TECHNOLOGICAL IMPLICATIONS OF IP-BASED COMMUNICATIONS ON CONTENT/NON-CONTENT DISTINCTIONS AND THE THIRD PARTY DOCTRINE Steven M. Bellovin,1 Matt Blaze,2 Susan Landau,3 and Stephanie K. Pell4 F

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2016-06-07 13:58:45
574Security / Safety / Prevention / Surveillance / Economic development / Internet of Things / Public policy / Smart city / Sustainable urban planning / Hong Kong / Public transport / Closed-circuit television

www.thalesgroup.com Thales Position Paper in answer to OGCIO Public Consultation for Hong Kong 2014 Digital 21 Strategy

Add to Reading List

Source URL: www.digital21.gov.hk

Language: English - Date: 2014-01-20 06:40:25
575Security / Prevention / Misconduct / Identity theft / Crime prevention / Cybercrime / Identity documents / Computer network security / Computer security / Password / Internet fraud / Internet privacy

11 Ways to Protect Yourself Online Thanks to the Internet, life is easier than it used to be. Recent headlines remind us, however, that technological progress has also created new opportunities for fraud (and much worse)

Add to Reading List

Source URL: www.cnb.com

Language: English - Date: 2014-08-06 17:57:41
576Security / Prevention / National security / Mass surveillance / Crime prevention / Law enforcement / Surveillance / National Security Agency / Internet privacy / Cloud computing / Internet / Edward Snowden

On the Feasibility of a Technological Response to the Surveillance Morass Joan Feigenbaum and J´er´emie Koenig Yale University, New Haven CT, USA E-mail: {joan.feigenbaum, jeremie.koenig}@yale.edu

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2014-05-31 10:55:23
577Software / Computing / Cyberwarfare / Computer network security / Internet Standards / Multi-agent systems / Spamming / Transmission Control Protocol / Skype / Botnet / Transport Layer Security / Network packet

Two Methods for Detecting Malware Maciej Korczyński, Gilles Berger-Sabbatel, and Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory UMR, rue de la Passerelle, BPSaint

Add to Reading List

Source URL: mkorczynski.com

Language: English - Date: 2015-02-15 17:10:50
578Library science / Technology / Security / Digital media / Content-control software / Digital rights management / Internet censorship / Internet / Public library / Library / Computer security / Sumter County Library /  FL

Internet Use Policy It is the intent of the Mesa County Public Library District to provide free, equitable, and organized public access to Internet resources. This access honors the fundamental library principle of intel

Add to Reading List

Source URL: mesacountylibraries.org

Language: English - Date: 2016-06-16 11:47:28
579Security / Computer access control / Computer security / Cryptography / Online banking / Internet security / Password / Transaction authentication number / Authentication / Login / AmBank

Security Statement About this Security Statement This AmBank Group Web Portal Security Statement (‘Security Statement’) applies to the AmBank Group website www.ambankgroup.com ("AmBank Group Web Portal"). Through lin

Add to Reading List

Source URL: community.truebyambank.com

Language: English - Date: 2014-12-14 20:12:57
580Computing / Network architecture / Internet protocols / Secure communication / World Wide Web / Computer networking / Transport Layer Security / QUIC / Proxy server / SPDY / HTTPS / Hypertext Transfer Protocol

The Cost of the “S” in HTTPS David Naylor? , Alessandro Finamore† , Ilias Leontiadis‡ , Yan Grunenberger‡ , Marco Mellia† , Maurizio Munafò† , Konstantina Papagiannaki‡ , and Peter Steenkiste? ? Carnegi

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:56:14
UPDATE