Plaintext

Results: 367



#Item
191Computing / Encryption / Mobile computing / Plaintext / Internet privacy / Privacy / Information security / Mobile business intelligence / Cryptography / Ethics / Security

U of A Policies and Procedures On-Line (UAPPOL) Approval Date: May 11, 2011 Parent Policy: IT Security Policy Encryption Procedure

Add to Reading List

Source URL: policiesonline.ualberta.ca

Language: English - Date: 2012-07-24 11:57:07
192Classes of computers / Computer storage media / Laptop / Personal computing / Theft / Plaintext / Removable media / Data storage device / Personal computer hardware / Information science / Computing / Information

Laptop Computer and Removable Storage Device Security Policy

Add to Reading List

Source URL: www.mtas.tennessee.edu

Language: English - Date: 2014-10-28 01:08:29
193Homomorphic encryption / Cipher / Encryption / Public-key cryptography / Key / Plaintext / Chosen-plaintext attack / Deterministic encryption / Cryptography / Cyberwarfare / Security

Top 10 Challenges in Cryptography for Big Data Arnab Roy Software Systems Innovation Group Fujitsu Laboratories of America

Add to Reading List

Source URL: www.fujitsu.com

Language: English - Date: 2014-02-05 05:45:47
194Data security / Computer network security / Crime prevention / National security / Key escrow / Public-key cryptography / Backup / Computer security / Plaintext / Cryptography / Security / Key management

RISKS THE OF KEY RECOVERY,KEYESCROW, TRUSTED THIRD PARTY

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 2001-01-02 13:41:20
195National security / Cryptography / Data security / Data management / Information security / Computer security / Plaintext / Encryption / USB flash drive / Security / Computing / Crime prevention

PDF Document

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2013-06-28 15:17:47
196Data security / Theft / Mobile computers / Automatic identification and data capture / Mobile computing / Mobile device / Information security / Plaintext / Identity theft / Technology / Security / Information

Policy Summary No. 3 Portable Storage Devices Information Security Branch, Office of the Chief Information Officer Ministry of Citizens’ Services, Province of British Columbia http://www.cio.gov.bc.ca/cio/informationse

Add to Reading List

Source URL: www.cio.gov.bc.ca

Language: English - Date: 2013-03-27 20:17:10
197Sleep / Referral marketing / Infancy / Infant / Known-plaintext attack

Baby Sleep Basics Referral Form 2117 SW Highway 484 Ocala FL[removed]Office: ([removed]Fax[removed]Attn: Lalita Hogan From Agency/Organization:

Add to Reading List

Source URL: www.kidscentralinc.org

Language: English - Date: 2012-08-14 14:39:29
198Computing / Laptop / Personal computing / Cyberwarfare / Encryption / Plaintext / Information security / Password / Laptop theft / Cryptography / Security / Disk encryption

From: Andrews, Dewayne (HSC) Sent: Monday, October 21, 2013 9:34 AM To: HSC-OUHSC Subject: Clarification of Laptop Encryption Policy & Process Importance: High

Add to Reading List

Source URL: it.ouhsc.edu

Language: English - Date: 2013-10-21 11:07:59
199Computing / Cryptographic software / Microsoft Windows / Encryption / Wireless security / Wi-Fi Protected Access / USB flash drive / Wi-Fi / Plaintext / Disk encryption / Cryptography / Computer network security

State of Illinois Central Management Services Monthly Cyber Security Tips NEWSLETTER September 2012

Add to Reading List

Source URL: www.illinois.gov

Language: English - Date: 2013-07-15 08:23:03
200Computing / Microsoft Windows / Encryption / Wireless security / USB flash drive / Plaintext / Encrypting File System / IEEE P1619 / Disk encryption / Cryptography / Cryptographic software

Monthly Cyber Security Tips - NEWSLETTER May 2008 Volume 3, Issue 5 Using Encryption to Protect Data

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2013-06-28 15:18:58
UPDATE