Network security policy

Results: 1254



#Item
161Computer security / Email / Etiquette / Internet culture / Domain name / Internet / Network architecture / Computing / Domain name system / Acceptable use policy

Document JSPG Policies Title

Add to Reading List

Source URL: www.biggrid.nl

Language: English - Date: 2013-10-24 08:44:27
162Public economics / Social systems / Welfare state / Social security / Taxation in the United States / China / Social policy / Welfare / Rural health / Sociology / Government / Social programs

SNoW Newsletter Published at the Nordic Centre, Fudan University SN W Sino-Nordic Welfare Research Network

Add to Reading List

Source URL: www.norway.org.cn

Language: English - Date: 2014-05-14 00:16:24
163Global Monitoring for Environment and Security / Meteosat / Baseline Surface Radiation Network / Validation / Eumetcast / GIO / Spaceflight / European Space Agency / Space policy of the European Union

GIO-GL Lot 1, GMES Initial Operations Date Issued: Issue: I2.10 Gio Global Land Component - Lot I ”Operation of the Global Land Component”

Add to Reading List

Source URL: land.copernicus.eu

Language: English - Date: 2015-03-23 06:31:05
164National security / Crime prevention / Computer security / Electronic commerce / Institute for Transportation and Development Policy / Proactivity / International Multilateral Partnership Against Cyber Threats / Insider / Transport / Security / Computer network security

Proactive Compliance for Insider Threat Protection By Larry Knutsen, co-founder, Strongbox Cyber Solutions LLCwww.strongboxcybersolutions.com

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 07:38:51
165Government / Frontex / Right of asylum / European Migration Network / Area of freedom /  security and justice / PICUM / European Council on Refugees and Exiles / Refugee / Franco Frattini / European Union law / European Union / International relations

EPC Policy Update for the European Programme for Integration and Migration1 September 2014 Andreia Ghimis and Yves Pascouau Highlights

Add to Reading List

Source URL: www.epim.info

Language: English - Date: 2014-09-12 03:56:21
166Radicalization / Sociology / Institute for Strategic Dialogue / Counter-terrorism / ETA / John Horgan / The International Centre for the Study of Radicalisation and Political Violence / Richard Barrett / Politics / National security / Terrorism

THE ROLE OF CIVIL SOCIETY IN COUNTERRADICALISATION AND DE-RADICALISATION A WORKING PAPER OF THE EUROPEAN POLICY PLANNERS’ NETWORK ON COUNTERING RADICALISATION AND POLARISATION (PPN) 1

Add to Reading List

Source URL: www.strategicdialogue.org

Language: English - Date: 2011-10-25 05:03:53
167Law enforcement / Law enforcement in Europe / Europol / European Union / European Police College / Frontex / Framework Programmes for Research and Technological Development / Common Security and Defence Policy / European Commission / Agencies of the European Union / Government / Europe

Analysis A new player in SecurityResearch: the European Network of Law Enforcement Services (ENLETS) Eric Töpfer

Add to Reading List

Source URL: www.statewatch.org

Language: English - Date: 2011-10-01 14:04:15
168Key management / Passphrase / Password / Two-factor authentication / Key / Randomness / Computer network security / Diceware / Password policy / Cryptography / Security / Computer security

OUCH! | April, 2015 IN THIS ISSUE... • Passphrases • Using Passphrases Securely • Resources

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2015-03-31 16:53:29
169Cyberwarfare / Data security / Crime prevention / National security / Information security / Vulnerability / Threat / Security controls / Network security / Security / Computer security / Computer network security

Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat Oliver Buckley, Jason R. C. Nurse, Philip A. Legg, Michael Goldsmith, Sadie Creese Cyber Security Centre, Department of Compute

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2015-03-18 10:54:09
170National security / Crime prevention / Computer security / Computer network security / Information security / Emergency management / Emergency / Backup / Security / Data security / Public safety

ICHIGAN Security – A Security Architecture that Enables Situation-Based Policy Switching Hiroshi Maruyama∗ , Kiyoshi Watanabe† , Sachiko Yoshihama‡ , Naohiko Uramoto‡ , Yoichiro Takehora§ , Kazuhiro Minami∗

Add to Reading List

Source URL: systemsresilience.org

Language: English - Date: 2013-08-19 03:20:56
UPDATE