Privacy software

Results: 6129



#Item
491Criminal law / Contract law / End-user license agreement / Data Protection Act / Open data / Proprietary software / Information privacy / Computer law / Law / Software licenses

The James Hutton Institute Open Data Licence You should print a copy of this text for future reference. This end-user licence agreement (EULA) is a legal agreement between you, the user and The James Hutton Institute (In

Add to Reading List

Source URL: www.soils-scotland.gov.uk

Language: English - Date: 2015-03-12 06:41:32
492Internet privacy / Software architecture / Representational state transfer / Hypertext Transfer Protocol / Proxy server / World Wide Web / Client–server model / X Window System core protocol / Service-oriented architecture / Computing / Computer networking / Network performance

Principled Design of the Modern Web Architecture Roy T. Fielding and Richard N. Taylor Information and Computer Science University of California, Irvine Irvine, CA 92697 –3425 USA +

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2000-03-06 04:09:15
493Computer network security / Wireless networking / GTK+ / Aircrack-ng / Wireshark / Scapy / Pcap / Transmission Control Protocol / Wired Equivalent Privacy / Software / Computing / System software

EECS 388 Intro to Computer Security October 10, 2014 Project 3: Network Security

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2014-12-24 15:06:41
494Digital signature / Public key certificate / Revocation list / GNU Privacy Guard / Cryptography / Public-key cryptography / Key management

KeyMan: Trust Networks for Software Distribution Ben Laurie <> Matthew Byng-Maddick <> February 28, 2002

Add to Reading List

Source URL: keyman.aldigital.co.uk

Language: English - Date: 2006-10-26 21:57:43
495Software / Privacy / World Wide Web / Web 2.0 / HTTP cookie / Google Analytics / Google / AdSense / Information privacy / Computing / Internet privacy / Internet

Sweetpea & Betty Website Privacy Policy VersionMarch 2011 Privacy Policy We are committed to safeguarding the privacy of our website visitors; this policy1 sets out how we will treat your personal information. (1)

Add to Reading List

Source URL: www.sweetpeabetty.co.uk

Language: English - Date: 2013-04-21 15:41:23
496Social media / Web 2.0 / Social information processing / Facebook / Blog hosting services / Internet privacy / Privacy / Social networking service / Tagged / World Wide Web / Computing / Software

The Scottish Adoption Guide to Facebook Privacy Scottish Adoption 161 Constitution Street Edinburgh EH6 7AD tel: fax:

Add to Reading List

Source URL: www.scottishadoption.org

Language: English - Date: 2014-07-22 05:46:46
497Cloud computing / Computer network security / Google Chrome / Software testing / National security / Criticism of Google / Google / Vulnerability / Internet privacy / Software / Computing / Computer security

Google for Work Security and Compliance Whitepaper How Google protects your data. for Work

Add to Reading List

Source URL: static.googleusercontent.com

Language: English - Date: 2015-04-02 15:33:25
498Smartphones / Common law / Duty of confidentiality / Privacy / Privileged communication / Android / Copyright / Internet Relay Chat / X Window System / Software / Computing / Law

Privacy Statement Pixoyo Design & Multimedia Pixoyo provides services and ongoing work in the field of design, multimedia and develops identities for products, businesses and services. These terms apply to any supply of

Add to Reading List

Source URL: www.pixoyo.nl

Language: English - Date: 2015-03-20 09:28:11
499Web 2.0 / Webmail / World Wide Web / Computing / Cross-platform software / Gmail / Internet privacy

AUSTRALIA Belinda Beryl Anthony David Narelle

Add to Reading List

Source URL: www.gottman.com

Language: English - Date: 2015-05-05 15:33:16
500Secure communication / Computing / Internet protocols / Security / Internet standards / Transport Layer Security / Cipher suite / GnuTLS / HTTP Secure / Cryptography / Cryptographic protocols / Cryptographic software

2013 IEEE Symposium on Security and Privacy Implementing TLS with Verified Cryptographic Security Karthikeyan Bhargavan∗ , C´edric Fournet† , Markulf Kohlweiss† , Alfredo Pironti∗ , Pierre-Yves Strub‡ ∗ IN

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-04-05 19:56:46
UPDATE