Privacy engineering

Results: 1416



#Item
781Computing / Internet privacy / Telecommunications engineering / Wireless access points / Hotspot / Wi-Fi / Password / Tor / Virtual private network / Wireless networking / Technology / Computer network security

October  2014  C.A.S.E.  Churches Against   Senior Exploitation 

Add to Reading List

Source URL: www.weldgov.com

Language: English - Date: 2014-10-15 00:19:47
782Computer crimes / Crime / Confidence tricks / Social engineering / Phishing / Internet fraud / Identity theft / Vishing / Hacker / Computing / Internet / Spamming

Vol. 1, Issue 2 – Winter[removed]Your Logo Here] Your quarterly resource for security and privacy awareness

Add to Reading List

Source URL: www.privacyguidance.com

Language: English - Date: 2011-03-31 19:12:00
783Internet privacy / European Data Protection Supervisor / Information privacy / HTTP cookie / Privacy-enhancing technologies / Privacy / Ethics / Computing

IPEN - The Internet Privacy Engineering Network Workshop: Engineering Privacy into Internet Services and Applications Date: Friday, 26 September 2014

Add to Reading List

Source URL: secure.edps.europa.eu

Language: English - Date: 2014-09-26 07:26:04
784Privacy / Technology / Wireless / Telecommunications engineering / Automatic identification and data capture / Radio-frequency identification / Human–computer interaction

Identification Documents/Privacy

Add to Reading List

Source URL: www.ftb.ca.gov

Language: English - Date: 2015-01-02 14:04:07
785Privacy of telecommunications / Privacy law / Surveillance / Pen register / Signals intelligence / Trap and trace device / Triggerfish / Mobile phone tracking / Patriot Act / Technology / Electronic engineering / Telephony

In re the Application of the U.S. for an Order Authorizing..., --- F.Supp.2d[removed])         !"#

Add to Reading List

Source URL: epic.org

Language: English - Date: 2013-02-12 14:35:02
786Privacy / Internet privacy / Personally identifiable information / Ethics / Identity management / Law

Highway Materials Engineering Course Application

Add to Reading List

Source URL: www.fhwa.dot.gov

Language: English - Date: 2014-07-24 10:15:35
787Technology / Human–computer interaction / Computing / Information / Intranet / Systems engineering process / Usability / Information architecture / Computer networks / Internet privacy / Technical communication

IA Column Bulletin of the American Society for Information Science and Technology – October/November 2012 – Volume 39, Number 1

Add to Reading List

Source URL: www.asis.org

Language: English - Date: 2014-07-19 18:53:36
788Internet privacy / C / Software engineering / Address / Programming language theory / Computing / ZIP code / Equal Employment Opportunity Commission

I. III. CHARGE OF DISCRIMINATION

Add to Reading List

Source URL: www.vidol.gov

Language: English - Date: 2014-10-16 11:26:41
789Security / Technology / Internet privacy / Social engineering / Malware / Social media / Social networking service / Computer security / Online shopping / Electronic commerce / Human development / Spamming

From the Desk of [Insert Name Here] The use of social media has exploded, with 255 million active users on Twitter and more than 1.2 billon on Facebook. Unfortunately, so too have the scams and attacks that target soci

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-09-29 12:54:23
790Technology / Internet privacy / Malware / Social media / Social networking service / Social engineering / Computer security / Online shopping / Electronic commerce / Human development / Security

September 2014 Volume 9, Issue 9 Social Media Scams – Spot Them Beforehand! Enterprise Security & Risk Management Office Monthly Security Tips

Add to Reading List

Source URL: www.esrmo.scio.nc.gov

Language: English - Date: 2014-09-30 10:19:14
UPDATE