Network security policy

Results: 1254



#Item
131HTTP / Scripting languages / Cross-site scripting / Cross-site request forgery / JavaScript / HTTP cookie / Same origin policy / World Wide Web / Web server / Software / Computing / Computer network security

SOMA: Mutual Approval for Included Content in Web Pages Terri Oda Glenn Wurster P. C. van Oorschot Anil Somayaji Carleton Computer Security Lab School of Computer Science Carleton University, Canada

Add to Reading List

Source URL: terri.zone12.com

Language: English - Date: 2008-11-02 21:28:43
132Security / Data security / Risk analysis / Vulnerability / Threat / Asset / Countermeasure / Firewall / Attack / Computer network security / Cyberwarfare / Computer security

An Approach to Security Policy Configuration Using Semantic Threat Graphs Simon N. Foley and William M. Fitzgerald Cork Constraint Computation Centre, Computer Science Department, University College Cork, Ireland s.foley

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2009-07-27 08:02:51
133National security / Ethics / Cryptography / Trusted Computing Group / Trusted Computing / Privacy / Intel / European Network and Information Security Agency / Information security / Security / Computer security / Crime prevention

Claire Vishik Trust & Security Technology & Policy Manager Intel Corporation Dr. Claire Vishik works at Intel Corporation focuses on hardware security, trusted computing, privacy enhancing technologies, some aspects of e

Add to Reading List

Source URL: www.trustindigitallife.eu

Language: English - Date: 2015-03-19 08:36:15
134Email / Etiquette / Internet / Internet culture / BIGLOBE / User / Network security / Computing / Acceptable use policy / Computer security

Acceptable Use Policy 1. Purpose This Acceptable Use Policy outlines certain types of activity that are expressly prohibited by BIGLOBE Inc. and Fullroute Pte. Ltd. (collectively "BIGLOBE Group") to users of the

Add to Reading List

Source URL: www.fullroute.net

Language: English - Date: 2014-12-09 19:12:29
135Cyberwarfare / Network security / Password / Firewall / Operating system / Password policy / Password manager / Computer network security / Security / Computer security

Introduction to Intrusion Protection and Network Security Jennifer Vesperman

Add to Reading List

Source URL: ldp.pakuni.net

Language: English - Date: 2002-03-20 10:00:48
136Cross-site scripting / FTP clients / News aggregators / Computer network security / HTTP cookie / Internet Explorer / Vulnerability / Same origin policy / Cross-site request forgery / Computer security / Cyberwarfare / Computing

Internet Explorer 11 vulnerability allows policy bypass

Add to Reading List

Source URL: techxplore.com

Language: English - Date: 2015-05-28 21:28:13
137Computer network security / Politics / Computer security / Electronic commerce / Secure communication / BCH code / Policy / Public safety / Security / Crime prevention / National security

BCH Security Category: Physical Resource Management Policy and Procedure POLICY Ballarat Community Health (BCH) will ensure that adequate security arrangements are provided and

Add to Reading List

Source URL: www.bchc.org.au

Language: English
138Cleanfeed / Computer network security / Content-control software / Internet Watch Foundation / Computing / Censorship / Internet / Deep packet inspection / Content filtering / Censorship in the United Kingdom / Internet governance / Censorship in Canada

International Internet Filtering Frameworks Alana Maurushat Faculty of Law, Cyberspace Law & Policy Centre, UNSW versus

Add to Reading List

Source URL: www.cyberlawcentre.org

Language: English - Date: 2009-03-31 21:23:07
139Electronic commerce / Spamming / Email spam / IiNet / Spam / Network security / Computer security / Acceptable use policy / AFACT v iiNet Ltd / Internet / Computing / Email

Our Customer Relationship Agreement ACCEPTABLE USE POLICY iiNet Limited ACNPhone: Internode Pty Ltd ABNPhone:

Add to Reading List

Source URL: www.westnet.com.au

Language: English - Date: 2014-08-25 22:20:55
140World Wide Web / Scripting languages / Software architecture / Web 2.0 / Cross-platform software / JavaScript / Mashup / HTTP cookie / Same origin policy / Computing / Computer network security / Software engineering

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D4.1

Add to Reading List

Source URL: www.websand.eu

Language: English - Date: 2011-10-25 10:27:30
UPDATE