Internet security

Results: 20779



#Item
941Computer access control / Wireless networking / Password / Security / Login / Wireless security / Wireless@SG

Wireless Accessing ConnSCU Internet Wireless from Macs (Revision Date: Introduction

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2013-09-18 16:04:55
942Alphabet Inc. / Internet privacy / Web analytics / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Google Analytics / Google Search / Personally identifiable information / Google / World Wide Web / Computer security

Data protection declaration We welcome you to our website and appreciate your interest in BITKOM Servicegesellschaft mbH. BITKOM Servicegesellschaft mbH treats the protection and safety of customer or user data with the

Add to Reading List

Source URL: www.garantiesystem-altgeraete.de

Language: English - Date: 2016-04-19 07:50:53
943Digital rights / Human rights / Privacy / Identity management / Law / Internet privacy / Medical privacy / Privacy Impact Assessment / Privacy Office of the U.S. Department of Homeland Security

Privacy Lead Objectives e-Safety Committee Objective • • •

Add to Reading List

Source URL: ikeepsafe.org

Language: English - Date: 2016-01-28 19:32:04
944Internet Standards / Internet protocols / Computability theory / Daikon / Software testing / Domain Name System Security Extensions / Domain Name System / Freeciv / Programming language / Object Process Methodology / Specification language / Internet protocol suite

Inference and enforcement of data structure consistency specifications Brian Demsky1 , Michael D. Ernst2 , Philip J. Guo2 , Stephen McCamant2 , Jeff H. Perkins2 , Martin Rinard2 University of California at Irvine, Irvine

Add to Reading List

Source URL: pgbovine.net

Language: English - Date: 2014-01-03 23:24:44
945Transport Layer Security / Network architecture / Internet protocols / Cryptographic protocols / Network protocols / Gossip protocol / Hypertext Transfer Protocol / Internet Relay Chat / HTTPS / Certificate authority / Clientserver model / Simple Mail Transfer Protocol

Efficient Gossip Protocols for Verifying the Consistency of Certificate Logs Laurent Chuat Pawel Szalachowski

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-11-04 13:06:02
946Mental health / Psychotherapy / Internet culture / Password / Security / Online counseling

Save some time! Before you graduate (or if you drop below half-time attendance), you are required to complete an exit counseling interview for your Direct PLUS Loans. The counseling session provides information about how

Add to Reading List

Source URL: mappingyourfuture.org

Language: English - Date: 2013-01-16 16:44:34
947Data security / Identity management / Law / Privacy / Occupational safety and health / Information security / Internet privacy / Personally identifiable information / Child protection

INFORMATION SHARING BETWEEN PRINCIPALS AND SCHOOLS (where an exemption to privacy law applies) Background Schools hold personal information (including health information) on each student enrolled.

Add to Reading List

Source URL: www.acsp.catholic.edu.au

Language: English
948Network management / Internet protocols / Computer network security / Network performance / NetFlow / IP Flow Information Export / Measuring network throughput / Traffic flow / Communications protocol / Packet analyzer / Pcap / Transport layer

Aggregation of Network Protocol Data Near its Source Marcel Fourn´e, Kevin Stegemann, Dominique Petersen, and Norbert Pohlmann Institute for Internet Security, Westf¨ alische Hochschule, University of Applied Sciences,

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 12:55:58
949Antivirus software / Password / Security / Kaspersky Lab / Phishing / Email / Internet privacy / Kaspersky Anti-Virus / Password strength

ARE YOU CYBER SAVVY? RESEARCH SUMMARY September, 2015 Contents

Add to Reading List

Source URL: press.kaspersky.com

Language: English - Date: 2015-10-30 16:24:05
950Accountability / Data security / National security / Digital rights / Human rights / Privacy / Internet privacy / Governance / Personally identifiable information / Medical privacy / Punishment / Computer security

Accountability and Deterrence in Online Life (Extended Abstract) Joan Feigenbaum James A. Hendler

Add to Reading List

Source URL: www.websci11.org

Language: English - Date: 2016-03-15 09:54:21
UPDATE