Messaging Security

Results: 466



#Item
331Text messaging / Email / Computing / Network protocols / United States Department of Homeland Security / Technology / Mobile technology / SMS

THE MITRE CORPORATION The Trusted Automated eXchange of Indicator Information (TAXII™) Julie Connolly, Mark Davidson, Charles Schmidt

Add to Reading List

Source URL: taxii.mitre.org

Language: English - Date: 2014-05-02 12:13:08
332International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / MAAWG / Idaho / Idaho National Laboratory / Computer crimes / Security / Computer security

To: National Institute of Standards and Technology – National Initiative for Cybersecurity Education From: Messaging Anti-Abuse Working Group (MAAWG)

Add to Reading List

Source URL: www.maawg.org

Language: English - Date: 2011-09-15 16:39:23
333Data security / Cross-platform software / Cyberwarfare / Firewall / Adobe Flash / Adobe Connect / Adobe Systems / Real Time Messaging Protocol / Software / Computing / Computer network security

Microsoft Word - TroubleConnectingtoAdobe Connect

Add to Reading List

Source URL: blogs.extension.org

Language: English - Date: 2012-02-13 11:45:12
334Computer file formats / Technical communication / Markup languages / Cryptographic protocols / Secure communication / Public Health Information Network / EbXML / Secure messaging / Transport Layer Security / Computing / Technology / Information

Functional Requirements and Process Flows

Add to Reading List

Source URL: www.cdc.gov

Language: English - Date: 2011-05-18 14:53:15
335Computer file formats / Technical communication / Markup languages / Cryptographic protocols / Secure communication / Public Health Information Network / EbXML / Secure messaging / Transport Layer Security / Computing / Technology / Information

Functional Requirements and Process Flows

Add to Reading List

Source URL: www.cdc.gov

Language: English - Date: 2011-05-20 09:05:08
336Online chat / Spam filtering / Computer security / Symantec / Instant messaging / Anti-spam techniques / Network security / Spam / Threat / Computing / Internet / Computer network security

A How-to guide For IT Security in Government Information on Seven Key Public-Sector Security Challenges

Add to Reading List

Source URL: www.mi.gov

Language: English - Date: 2012-12-07 14:35:37
337Security / Social engineering / Global Information Assurance Certification / Phishing / Computer-mediated communication / Security awareness / Instant messaging / Password / Malware / Cybercrime / Computing / Computer security

GIAC Enterprises Security Awareness Execution Plan MGT 433 Assignment Author: Eric Jodoin, [removed] Submitted: March 3rd 2014

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2014-03-07 11:36:51
338Interoperability / WS-ReliableMessaging / SOAP / Reliable messaging / WS-Security / WS-I Basic Profile / Security Assertion Markup Language / WS-Addressing / Health Level 7 / Computing / Web standards / Web services

75 Nationwide Health Information Network Messaging Platform Specification v 3.0 Nationwide Health Information Network

Add to Reading List

Source URL: healthewayinc.org

Language: English - Date: 2012-10-31 18:19:33
339Interoperability / WS-ReliableMessaging / WS-I Basic Profile / WS-Security / SOAP / Reliable messaging / Security Assertion Markup Language / WS-Policy / EbXML / Computing / Web standards / Web services

NHIE Specification Outline

Add to Reading List

Source URL: healthewayinc.org

Language: English - Date: 2012-10-31 18:18:51
340Computer-mediated communication / Email / Online chat / CAN-SPAM Act / Anti-spam techniques / Email spam / Spam / Text messaging / Instant messaging / Internet / Computing / Spamming

Privacy and Security Law Report ® Reproduced with permission from Privacy & Security Law Report, 13 PVLR 145, [removed]Copyright 姝 2014 by The Bureau of National Affairs, Inc[removed]http://www.bna.com

Add to Reading List

Source URL: www.osler.com

Language: English - Date: 2014-03-11 16:18:50
UPDATE