Network security policy

Results: 1254



#Item
641Eduroam / Security / Internet protocols / IEEE 802.1X / RADIUS / Authentication / Network service / Computing / Computer network security / Computer security

EDUROAM National policy for Armenia version 1.0

Add to Reading List

Source URL: eduroam.am

Language: English - Date: 2012-07-17 08:18:06
642Computer network security / Email / Crime prevention / National security / Technology / Information security / Internet privacy / Password / Internet / Computer security / Security / Computing

Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not a right, and us

Add to Reading List

Source URL: www.providence.edu

Language: English - Date: 2012-10-18 09:05:02
643Technology / Computer security / Internet privacy / Computer network / Internet / Peer-to-peer / Acceptable use policy / Information security / Network security / Email / Computing / Digital media

STATE OF TENNESSEE Acceptable Use Policy Network Access Rights and Obligations Purpose: To establish guidelines for State-owned hardware and software, computer network access and usage, Internet and email usage, telephon

Add to Reading List

Source URL: www.tennessee.gov

Language: English - Date: 2014-04-21 13:24:28
644Security / McAfee / Antivirus software / Companies listed on the New York Stock Exchange / Vulnerability / Threat / Spyware / McAfee VirusScan / Host Based Security System / Cyberwarfare / Computer security / Computer network security

Data Sheet McAfee Embedded Control—Retail System integrity, change control, and policy compliance for retail point‑of‑sale systems McAfee® Embedded Control for Retail maintains the integrity of your point-of-sale

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:52:49
645Computer network / Telecommunications engineering / Authorization / Internet privacy / Server / Personal computer / Vulnerability / Network service / Internet / Technology / Computing / Computer security

General/Student Policy - Use of Computer and Network Facilities Policy: Individuals who use Bismarck State College (BSC) computing and networking resources assume the responsibility to use the resources in an appropriate

Add to Reading List

Source URL: www.bismarckstate.edu

Language: English - Date: 2013-09-30 17:46:32
646Internet privacy / Privacy / Security / Information security / Network security / Ethics / Identity management / Computer security

STATE OF TENNESSEE Acceptable Use Policy Network Access Rights and Obligations User Agreement Acknowledgement As a user of State of Tennessee data and resources, I agree to abide by the Acceptable Use Network Access Righ

Add to Reading List

Source URL: www.tennessee.gov

Language: English - Date: 2014-04-21 13:24:29
647Data security / Electronic commerce / National security / Cyberwarfare / Security controls / Requirement / Computer network security / Security / Computer security

Colorado State University Proposal of compensating controls to be accepted in lieu of selected portions of the CSU IT Security Policy Revised 28 June, 2012 (under version 1.12 of the CSU IT Security Policy) As indicated

Add to Reading List

Source URL: www.acns.colostate.edu

Language: English - Date: 2012-06-28 18:31:17
648Technology / Internet privacy / Security / Computing / Peer-to-peer / Internet / Computer network / Password / Cybercrime and countermeasures / Computer security / Internet ethics / Digital media

Western Kentucky University Computing Ethics Policy The general standards of conduct expected of a member of this education institution also apply to the use of University computing resources. These resources include: 1.

Add to Reading List

Source URL: www.thefire.org

Language: English - Date: 2014-03-04 10:17:43
649XTR / Homomorphic encryption / ElGamal encryption / Internet privacy / Cryptography / Mathematics / Computer security / Public-key cryptography / Cyberwarfare / RSA

Techniques for Policy Enforcement on Encrypted Network Traffic Y. Sinan Hanay and Tilman Wolf Department of Electrical and Computer Engineering University of Massachusetts, Amherst, MA, USA {hanay,wolf}@ecs.umass.edu

Add to Reading List

Source URL: www.ecs.umass.edu

Language: English - Date: 2013-12-04 11:29:34
650Public safety / Data security / Computer security / Computer network security / Information security / Vulnerability / Security controls / Health Insurance Portability and Accountability Act / Identity theft / Security / National security / Crime prevention

Microsoft Word - security-policy_6302011 (1).doc

Add to Reading List

Source URL: its.unc.edu

Language: English - Date: 2014-08-14 10:38:36
UPDATE