Network Policy Server

Results: 104



#Item
71Java applet / JDBC driver / Java Database Connectivity / Java / Network socket / Server / SAS language / Computing / Java platform / SAS

Choosing a Method for Connecting Java to the SAS System Across the Internet CGI, JDBC, Socket, or JConnect? Larry Hoyle Institute for Public Policy and Business Research University of Kansas 

Add to Reading List

Source URL: ipsr.ku.edu

Language: English - Date: 2013-04-01 08:59:13
72Internet censorship / Email / Internet privacy / Password / Content-control software / Network security / Proxy server / Hempfield Area High School / Internet / Computing / Digital media

Procedure 2022P Electronic Resources K-20 Network Acceptable Use Guidelines/Internet Safety Requirements These procedures are written to support the Electronic Resources Policy of the board of directors and to promote p

Add to Reading List

Source URL: www.k12.wa.us

Language: English - Date: 2012-12-10 19:04:54
73Email / Internet censorship / Internet privacy / Password / Content-control software / Network security / Proxy server / Hempfield Area High School / Internet / Computing / Digital media

Procedure 2022P Electronic Resources K-20 Network Acceptable Use Guidelines/Internet Safety Requirements These procedures are written to support the Electronic Resources Policy of the board of directors and to promote p

Add to Reading List

Source URL: www.k12.wa.us

Language: English - Date: 2012-03-01 11:22:28
74Computer security / Public safety / Computer network / Telecommunications engineering / Computing / Network security / Server / Information security / Vulnerability / Security / Crime prevention / National security

Statewide Policy SUBJECT: Acceptable Use of State Information Assets NUMBER: [removed]

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2012-02-28 22:11:31
75Computer network / Telecommunications engineering / Email / Home server / Password / Information security audit / Criticism of Facebook / Digital media / Technology / Internet

Oklahoma City University Computer Use Policy[removed]Introduction General

Add to Reading List

Source URL: www.okcu.edu

Language: English - Date: 2007-04-10 01:00:00
76Hewlett-Packard / HP OpenView / System administration / Software versioning / Software release life cycle / HP Software Division / IBM WebSphere Application Server / HP Operations Manager / Computing / Software / Network management

OpenView Policy Library Product Version Obsolescence Policy- End of Support Guidelines (version 4.2) Introduction: The purpose of the Support Version Policy 4.2 (this policy) is to put forward a standard set of

Add to Reading List

Source URL: support.openview.hp.com

Language: English - Date: 2010-03-26 10:01:03
77Credit card / Password / Proxy server / Modem / User / Internet / Network architecture / Computing / Lompoc /  California / Surf

LOMPOCNET SERVICE AGREEMENT AND USE POLICY Revision[removed], v.2 Page 1 of 5 THIS SERVICE AGREEMENT AND USE POLICY ("Agreement"), governs access to and use of facilities, services or resources ("Services", as hereinafte

Add to Reading List

Source URL: www.cityoflompoc.com

Language: English - Date: 2012-08-28 19:01:34
78Directory services / Internet protocols / Network file systems / Email / Internet standards / Server Message Block / Kerberos / Group Policy / Microsoft Open Specification Promise / Computing / Microsoft Windows / Software

PDF Document

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2013-07-23 18:33:24
79Crime prevention / National security / Computer network security / Secure communication / Data security / Mainframe computer / Backup / Vulnerability / Security / Computer security / Cyberwarfare

ENCRYPTING MAINFRAME AND SERVER TAPES TECHNOLOGY LETTER[removed]Frequently Asked Questions Technology Letter[removed]announces a change to State Administrative Manual (SAM) Section[removed]By eliminating a policy exclusion i

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2013-06-28 15:10:34
80Electronics / Server appliance / Internet privacy / Network architecture / Cisco Systems / Virtual private network / Cisco IOS / Network switch / Cisco / Computing / Computer network security / Routers

Cisco 7140 VPN Router with ISM Security Policy Introduction This nonproprietary Cryptographic Module Security Policy describes how Cisco 7140 VPN routers meet the security requirements of the Federal Information Processi

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE