Protected computer

Results: 695



#Item
251Internet / Computing / Privacy of telecommunications / Password / Passphrase / Secure messaging / Password notification email / Email privacy / Email / Internet privacy / Computer-mediated communication

The University of Kansas Medical Center (KUMC) has implemented secure messaging to protect the privacy and confidentiality of sensitive information including protected health or personal identity information that is cont

Add to Reading List

Source URL: www.kumc.edu

Language: English - Date: 2011-09-16 14:15:11
252Cybercrime / Protected computer / United States Code / Government / Information technology audit / National Information Infrastructure Protection Act / Computer law / Law / Computer network security

18 USC 1030 NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see http://www.law.cornell.edu/uscode/uscprint.html). TITLE 18 - CRIMES AND CRIMINAL PROCEDURE PART I - CRIMES CHAPTER 47 - FRAU

Add to Reading List

Source URL: www.law.cornell.edu

Language: English - Date: 2013-07-17 17:57:16
253AutoRun / Computer security / Installation / System software / Software / Installation software

PlanBuilder Copyright The paragraphs, information and documentation provided in this product are the property of Binomial International and as such are protected under international copyright laws. The information stor

Add to Reading List

Source URL: www.binomial.com

Language: English - Date: 2012-03-13 15:54:08
254Computing / Electronic engineering / IEEE 802.11 / Wi-Fi Protected Access / Wi-Fi / Wireless access point / Wireless network interface controller / Service set / Wireless security / Wireless networking / Computer network security / Technology

Laird Command Line Utility Documentation Wi-Fi Products Version 2.2 Embedded Wireless Solutions Support Center: http://ews-support.lairdtech.com Americas: +[removed]Option 2

Add to Reading List

Source URL: www.lairdtech.com

Language: English - Date: 2014-09-30 10:26:10
255Computing / Media technology / Xerox / IEEE 802.1X / Printer / Wi-Fi / Comparison of wireless LAN clients / Wi-Fi Protected Access / Computer network security / Wireless networking / Technology

Xerox Wireless Network Adapter Set your business free with wireless printing The high-performance Xerox WNA-100 wireless network adapter connects your Phaser®

Add to Reading List

Source URL: www.office.xerox.com

Language: English - Date: 2008-09-02 14:34:31
256Wireless / Telecommunications engineering / Wireless LAN / Wireless access point / Service set / Rogue access point / Wireless ad-hoc network / Wi-Fi Protected Access / IEEE 802.1X / Wireless networking / Technology / Computer network security

Networking at Cardiff University Wireless Access Point Policy and Guide[removed]V2 Monday, 18 October 2004

Add to Reading List

Source URL: www.cardiff.ac.uk

Language: English - Date: 2013-08-20 06:33:57
257Technology / IEEE 802.1X / ActiveSync / Cisco Systems / Supplicant / Comparison of wireless LAN clients / Protected Extensible Authentication Protocol / Computing / Computer network security / Wi-Fi

Release Notes for Cisco Aironet Client Utilities 2.70 and Driver 2.70 for Windows CE Contents This document contains the following sections: •

Add to Reading List

Source URL: www.cisco.com

Language: English
258Computer network security / Technology / IEEE 802.11 / Computing / Wi-Fi / Wi-Fi Protected Access / Wireless access point / Wireless security / Wired Equivalent Privacy / Wireless networking / Cryptographic protocols / Cryptography

http://welcome.solutions.brother.com/BSC/public/us/us/en/faq/fa

Add to Reading List

Source URL: www.brother-usa.com

Language: English - Date: 2009-04-30 13:39:54
259Computer network security / Wireless networking / Wireless security / Password / Wi-Fi Protected Access / Hotspot / Cisco IOS / Wi-Fi / Wireless access point / Technology / Computing / Cryptography

Department Informatik Technical Reports / ISSN[removed]Andreas Kurtz, Felix Freiling, Daniel Metz Usability vs. Security: The Everlasting Trade-Off

Add to Reading List

Source URL: www1.cs.fau.de

Language: English - Date: 2013-06-12 11:53:56
260Criminal law / Computer network security / Cybercrime / Protected computer / Government / Computer Fraud and Abuse Act / United States Code / National Information Infrastructure Protection Act / Computer law / Law / Information technology audit

PUBLIC LAW[removed]—OCT. 16, [removed]STAT[removed]Public Law[removed]99th Congress

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2014-12-29 11:14:51
UPDATE