Internet security

Results: 20779



#Item
851IOS / Videotelephony / Mobile phones / Privacy / IPhone / ITunes / Electronic Privacy Information Center / Internet privacy / Apple Inc. / Identity theft / Mobile security / Smartphone

EPIC Motion and Amicus, NoSP) ALT

Add to Reading List

Source URL: www.apple.com

Language: English - Date: 2016-03-04 13:57:31
852Privacy / Cloud infrastructure / Cloud computing / Internet privacy / Big data / Privacy-enhancing technologies / Information privacy / Computer security / Framework Programmes for Research and Technological Development / XLAB d.o.o

Microsoft Word - DPSP_Cluster_map-of-synergies_v2.0

Add to Reading List

Source URL: eucloudclusters.files.wordpress.com

Language: English - Date: 2016-02-11 06:27:44
853Internet Standards / E-commerce / Internet protocols / Secure communication / Transport Layer Security / IBM System z9 / IBM System z / Z/OS / SSL acceleration

z/OS  System Secure Sockets Layer Programming

Add to Reading List

Source URL: publibfp.boulder.ibm.com

Language: English - Date: 2003-12-26 02:44:53
854Domain name system / Internet protocols / Internet Standards / DNSSEC / Domain Name System Security Extensions / Key management / Botnet / Name server / Alan Turing / Extension mechanisms for DNS

Decoding DNS data If you have a large DNS infrastructure, understanding what is happening with your real-time and historic traffic is difficult, if not impossible. Until now,

Add to Reading List

Source URL: www.nominet.uk

Language: English - Date: 2015-10-14 07:09:14
855Privacy / Identity management / Digital rights / Human rights / Privacy engineering / Security engineering / Internet privacy / Medical privacy / Information privacy / Privacy Impact Assessment

Privacy by Design-Engineering Privacy Workshop 3 Report Executive Summary Within the last few years, privacy experts in industry, government and academia have called for new thinking that enables engineering privacy into

Add to Reading List

Source URL: cra.org

Language: English - Date: 2015-12-30 13:06:46
856Security / Computer security / Data security / Impact assessment / Risk analysis / Privacy Impact Assessment / Risk management / Privacy / Internet privacy / IT risk / Risk assessment / Threat

Microsoft Word - EvotePosterPaperResubmit

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-05-31 10:35:58
857Internet Standards / Internet protocols / IETF Administrative Oversight Committee / Internet Engineering Task Force / Domain Name System Security Extensions / CloudFlare / Internet Message Access Protocol / Domain Name System / Internet of things

IAOC MinutesAttending: Jari Arkko [PRESENT] Scott Bradner [PRESENT] Tobias Gondrom [PRESENT] Chris Griffiths [PRESENT, Chair]

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2015-06-26 11:30:23
858Cryptographic software / Disk encryption / Cryptography / Computer virus / Internet security / Encryption / Trojan horses / Encrypting File System / EncFS

How-to guide. IMPORTANT! Make sure you remove the malware from your system first, otherwise it will repeatedly lock your system or encrypt files. Any reliable antivirus solution can do this for you. To decrypt the files:

Add to Reading List

Source URL: www.nomoreransom.org

Language: English - Date: 2016-07-25 04:33:08
859Internet advertising / Internet marketing / Information privacy / Data Protection Directive / European Union / Online advertising / Behavioral targeting / Internet privacy / Web analytics / Computer security / FTC regulation of behavioral advertising / Network Advertising Initiative

IAB Europe EU Framework for Online Behavioural Advertising April 2011 Introduction

Add to Reading List

Source URL: meine-cookies.org

Language: English - Date: 2015-05-08 03:28:45
860Cybercrime / Identity theft / Identity documents / Fraud / Security / Password / Phishing / Federal Trade Commission / Security hacker / Computer security / Internet fraud prevention

Goal: ​ Post about how consumers can protect themselves from identity theft.  Total Word Count In This Document: ​ 477  Title: ​ Identity Theft Protection: What You Need to Know 

Add to Reading List

Source URL: copywritertoday.net

Language: English - Date: 2016-03-23 19:31:54
UPDATE