Outline of computer security

Results: 53



#Item
11Information Technology Standard Information Security Education and Awareness Training Identifier: IT-STND-002

Information Technology Standard Information Security Education and Awareness Training Identifier: IT-STND-002

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2015-09-02 12:29:33
12Usable Security and Privacy in Technology Ethics Courses Patrick Gage Kelley Department of Computer Science University of New Mexico

Usable Security and Privacy in Technology Ethics Courses Patrick Gage Kelley Department of Computer Science University of New Mexico

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-17 22:36:03
13Institute for Software Research University of California, Irvine Security Day-to-Day: User Strategies for Managing Security as an Everyday, Practical Problem

Institute for Software Research University of California, Irvine Security Day-to-Day: User Strategies for Managing Security as an Everyday, Practical Problem

Add to Reading List

Source URL: www.dourish.com

Language: English - Date: 2008-06-14 12:49:22
14Fox-IT vormtaal patroon-0,3 cmyk

Fox-IT vormtaal patroon-0,3 cmyk

Add to Reading List

Source URL: www.fox-it.com

Language: English - Date: 2016-02-28 10:36:02
15Invensys  White Paper is now

Invensys White Paper is now

Add to Reading List

Source URL: iom.invensys.com

Language: English - Date: 2015-05-08 05:42:47
16REPORT OF THE LOSS PREVENTION COMMITTEE Chairman – Claudio Verconich Outline

REPORT OF THE LOSS PREVENTION COMMITTEE Chairman – Claudio Verconich Outline

Add to Reading List

Source URL: www.iumi.com

Language: English - Date: 2013-02-23 12:33:24
17Disclosure Control – outline for protocol

Disclosure Control – outline for protocol

Add to Reading List

Source URL: www.isdscotland.org

Language: English - Date: 2014-09-22 06:44:28
18Microsoft Word - Edit - The Need for an Official Governing Body.docx

Microsoft Word - Edit - The Need for an Official Governing Body.docx

Add to Reading List

Source URL: www.cerias.purdue.edu

Language: English - Date: 2015-03-31 09:17:47
19Course outline 1.  Language-Based Security: motivation 2.  Language-Based Information-Flow Security: the big picture 3.  Dimensions and principles of declassification 4.  Dynamic vs. static security enforcement

Course outline 1.  Language-Based Security: motivation 2.  Language-Based Information-Flow Security: the big picture 3.  Dimensions and principles of declassification 4.  Dynamic vs. static security enforcement

Add to Reading List

Source URL: www.sti.uniurb.it

Language: English - Date: 2014-09-11 02:40:15
202079IF11_outline_V7_6july11

2079IF11_outline_V7_6july11

Add to Reading List

Source URL: www.coe.int

Language: English - Date: 2011-07-06 12:13:04