Privacy software

Results: 6129



#Item
401Blog hosting services / Social information processing / Web 2.0 / Social networking service / Youth / Social media / Facebook / Internet privacy / Cycling / World Wide Web / Software / Computing

SG 5.2 Using Social Networking Services and Social Media The purpose of this document is to empower British Cycling clubs, coaches and members to utilise social media in a safe, sensible and professional manner to promot

Add to Reading List

Source URL: www.britishcycling.org.uk

Language: English - Date: 2013-05-15 06:54:23
402Cross-platform software / Web 2.0 / Gmail / Internet privacy / Webmail / Qatar / Visa / NEBOSH / Asia / Email / Computing

Gulf Times 1 Tuesday, June 16, 2015

Add to Reading List

Source URL: www.gulf-times.com

Language: English - Date: 2015-06-15 12:56:03
403Software bugs / C Standard Library / Stack buffer overflow / Buffer overflow / Subroutines / Address space layout randomization / Return-to-libc attack / NX bit / Pointer / Computing / Software engineering / Computer programming

2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

Add to Reading List

Source URL: wwwx.cs.unc.edu

Language: English - Date: 2014-09-05 15:38:44
404Software licenses / Open content / Information / Human–computer interaction / Technical communication / Usability / Creative Commons license / Remix / Internet privacy / Law / Intellectual property law / Computer law

This is a human-readable summary of (and not a substitute for) the General Terms and Conditions. Disclaimer: This summary is not a part of the General Terms and Conditions. It is just a human-readable summary for underst

Add to Reading List

Source URL: doraemon.know-why.net

Language: English - Date: 2015-06-22 09:16:49
405Cyberwarfare / Data security / Software testing / National security / Information security / Vulnerability / Information Systems Security Association / Application security / Business ethics / Security / Computer security / Computer network security

Ethics and Privacy ISSA Journal | October 2009 INSERT Ethics INTO Public Web App Testing By Michael Starks – ISSA member, Fort Worth, USA Chapter

Add to Reading List

Source URL: www.immutablesecurity.com

Language: English - Date: 2011-11-05 20:01:53
406HTTP / HTTP cookie / Google Chrome / Web browser / Internet Explorer / Software / Computing / Internet privacy

Issue Guide – Accept Cookies before you can Sign in or Register The Northern Ireland Substitute Teacher Register (NISTR) uses cookies to work with login credentials and they must be accepted before you can continue. Th

Add to Reading List

Source URL: www.nistr.org.uk

Language: English - Date: 2015-05-20 03:04:26
407Web 2.0 / Webmail / World Wide Web / Computing / Cross-platform software / Gmail / Internet privacy

Government of India Ministry of Tourism Citizen’s / Client’s Charter For the year)

Add to Reading List

Source URL: www.tourism.gov.in

Language: English - Date: 2015-05-25 01:46:33
408Virtual memory / University of Cambridge Computer Laboratory / Xen / Hyper-V / Rootkit / Hypervisor / Virtualization / Hardware virtualization / Device file / System software / Software / Virtual machines

1 Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches Srinivas Krishnan, Member, IEEE, Kevin Z. Snow, and Fabian Monrose

Add to Reading List

Source URL: wwwx.cs.unc.edu

Language: English - Date: 2014-09-05 15:38:44
409Photo sharing / Social media / Smartphones / Web 2.0 / Social information processing / Instagram / Internet privacy / Facebook / Twitter / World Wide Web / Computing / Software

Do you know how to share with a select group of your followers? Do you know how to block someone?

Add to Reading List

Source URL: dwn5wtkv5mp2x.cloudfront.net

Language: English - Date: 2015-05-21 07:34:56
410Internet privacy / PGP / Pretty Good Privacy / Students for a Democratic Society / Internet / SDS-PAGE / Computing / Scientific Data Systems / Samsung SDS / Computer security / Cryptographic software / Email authentication

SDS E-Business Server™ Research report by Clabby Analytics October 2012 Clabby Analytics Research Report

Add to Reading List

Source URL: www.sdsusa.com

Language: English - Date: 2015-02-13 13:30:30
UPDATE