Internet security

Results: 20779



#Item
791Cyberwarfare / Cybercrime / Information and communication technologies for development / National security / International Telecommunication Union / Cyberspace / Internet Governance Forum / Computer security / Commonwealth of Nations / International Multilateral Partnership Against Cyber Threats / Commonwealth Telecommunications Organisation

The role of the Commonwealth in facilitating cooperation in Cyberspace Shola Taylor, Secretary-General, Commonwealth Telecommunications Organisation Commonwealth Cybersecurity Forum 2016, 23 March 2015 Honourable Adriel

Add to Reading List

Source URL: www.cto.int

Language: English - Date: 2016-06-23 04:56:26
792Computer network security / Crime prevention / Cryptography / Information governance / National security / Acceptable use policy / Internet privacy / Computer security / Information privacy / Privacy / Privacy concerns with social networking services / Cloud computing security

Acceptable Use Policy for Wadham IT General Rules 1. All individuals wishing to make use of Wadham College IT facilities must abide by this document. Wadham IT facilities include networking, shared IT facilities such as

Add to Reading List

Source URL: www.wadham.ox.ac.uk

Language: English - Date: 2013-08-21 07:05:29
793E-commerce / Economic development / Internet of Things / Public policy / Smart city / Sustainable urban planning / Computer security / Singapore

EVENTS 16–22 Feb Singapore Airshow 2016 Singapore

Add to Reading List

Source URL: www.stee.stengg.com

Language: English - Date: 2016-05-26 21:59:41
794Computer network security / Computer access control / ESET / Multi-factor authentication / Authentication / OpenVPN / Virtual private network / RADIUS / Password / Internet Authentication Service / Electronic authentication

logotype - ESET Secure Authentication

Add to Reading List

Source URL: static4.esetstatic.com

Language: English - Date: 2015-07-29 05:51:23
795Accountability / Freedom of information laws by country / Government information / Privacy / United States corporate law / National Security Agency / Internet privacy / Records management / Email / Public records / Outlook.com

REQUEST UNDER THE NEW YORK FREEDOM OF INFORMATION LAW March 30, 2016 Records Access Officer Office of the Attorney General The Capitol Albany, NY 12224

Add to Reading List

Source URL: eelegal.org

Language: English - Date: 2016-04-28 13:02:57
796Computer network security / Crime prevention / Cryptography / Information governance / National security / Ubiquitous computing / Mobile computing / Computer security / Internet privacy / Authentication / Ambient intelligence / Wireless LAN

Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Interactions V. Ramakrishna, Kevin Eustice and Matthew Schnaider Laboratory for Advanced Systems Research Computer Science Department Univers

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2006-07-13 17:06:00
797Internet Standards / Internet protocols / Short Message Service / Text messaging / Transmission Control Protocol / Cryptographic protocols / Network protocols / Simple Authentication and Security Layer

Apache Avro# 1.8.1 SASL Profile Table of contents 1 Introduction........................................................................................................................2

Add to Reading List

Source URL: avro.apache.org

Language: English - Date: 2016-05-21 18:02:26
798Domain name system / Internet Standards / Internet protocols / Country code top-level domains / DNSSEC / Domain Name System Security Extensions / .nl / Hardware security module / Domain name / Domain registration / Domain name registrar

DNSSEC Policy and Practice Statement .amsterdam Contact T +www.sidn.nl

Add to Reading List

Source URL: nic.amsterdam

Language: English - Date: 2016-06-09 09:44:23
799Privacy of telecommunications / Mass surveillance / National security / Computer surveillance / Crime prevention / Lavabit / National Security Agency / Edward Snowden / Tailored Access Operations / PRISM / Qwest / Surveillance

Schneier on Security: More on the NSA Commandeering the Internet

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2013-09-11 13:58:48
800Access control / Computer security / Identity management / Perimeter security / Physical security / Usability / Password / Internet privacy / User / Privacy concerns with social networking services / Mobile security

Lessons Learned From the Deployment of a Smartphone-Based Access-Control System Lujo Bauer Lorrie Faith Cranor

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-05-31 14:34:10
UPDATE