Protected computer

Results: 695



#Item
261Wireless networking / Computer network security / Temporal Key Integrity Protocol / Wi-Fi Protected Access / Transmission Control Protocol / Initialization vector / Wired Equivalent Privacy / Man-in-the-middle attack / Stream cipher / Cryptography / Cryptographic protocols / IEEE 802.11

A Practical Message Falsification Attack on WPA Toshihiro Ohigashi1 and Masakatu Morii2 1 Hiroshima University, 1–4–2 Kagamiyama, Higashi-Hiroshima, 739–8511 Japan

Add to Reading List

Source URL: jwis2009.nsysu.edu.tw

Language: English - Date: 2014-07-04 02:33:26
262Privacy of telecommunications / Information sensitivity / United States government secrecy / Mass surveillance / Espionage / Foreign Intelligence Surveillance Act / WikiLeaks / Gorin v. United States / Protected computer / National security / Security / Government

Criminal Prohibitions on the Publication of Classified Defense Information Jennifer K. Elsea Legislative Attorney October 18, 2010

Add to Reading List

Source URL: digital.library.unt.edu

Language: English - Date: 2015-02-08 06:46:10
263Cloud clients / Portable software / Software licenses / Comodo Group / Comodo Dragon / Comodo / Chromium / End-user license agreement / GNU General Public License / Software / Computing / Computer law

Comodo Dragon End User License Agreement Copyright The Products contains material that is protected by United States and foreign intellectual property laws, including copyright, trade secret, and patent law. All rights n

Add to Reading List

Source URL: www.comodo.com

Language: English - Date: 2013-01-18 20:55:07
264Cloud clients / Portable software / Software licenses / Comodo Group / Comodo Dragon / Comodo / Chromium / End-user license agreement / GNU General Public License / Software / Computing / Computer law

Comodo Dragon End User License Agreement Copyright The Products contains material that is protected by United States and foreign intellectual property laws, including copyright, trade secret, and patent law. All rights n

Add to Reading List

Source URL: www.comodo.com

Language: English - Date: 2012-10-01 13:25:06
265Electronic documents / Computer file formats / Adobe Systems / Vector graphics / Technical communication tools / Portable Document Format / Adobe Acrobat / Digital rights management / Cloud computing / Software / Computing / Computer graphics

FileOpen Viewer and Cloud Sanford Bingham October 2011 This paper describes the basic concepts underlying the FileOpen Viewer platform, which is a mechanism for the multi-application delivery of protected digital content

Add to Reading List

Source URL: www.actino.de

Language: English - Date: 2013-04-03 09:57:16
266System software / ESET / Computer virus / Internet security / Rogue security software / Web threat / Panda Pro / Antivirus software / Malware / Software

SPRING 2013 Why last year’s security strategy can’t protect you from today’s threats If you deployed your security solution even just last year, you may not be protected from some of today’s most common malware

Add to Reading List

Source URL: static2.esetstatic.com

Language: English - Date: 2013-07-09 15:51:54
267Information technology audit / National Information Infrastructure Protection Act / Title 18 of the United States Code / Protected computer / Law / Computer law / Criminal law

Updated Law Enforcement Tools

Add to Reading List

Source URL: www.whitehouse.gov

Language: English - Date: 2015-01-13 14:57:25
268Modem / Password / Wi-Fi Protected Access / Service set / Computing / Wireless / Technology / Computer network security / Wireless networking / Logical Link Control

Setting up a BEC modem’s wireless functionality. Step 1. Make sure you are plugged directly into the modem with a laptop or PC, using the supplied cable or one of your own. Make sure the modem is powered on and ready t

Add to Reading List

Source URL: www.otz.net

Language: English
269Technology / Computer security / Data security / National security / Protected health information / Internet privacy / Information security / Personally identifiable information / Confidentiality / Ethics / Security / Privacy

November 20, 2014 MAC Binder Section 3 – Corrective Action Plans Part A Table of Contents  LOC to Anthem regarding ABC2014CR-1 dated October 1, 2014  Anthem Response to LOC regarding ABC2014CR-1 dated October 31,

Add to Reading List

Source URL: chfs.ky.gov

Language: English - Date: 2015-01-17 11:02:58
270Technology / Computer security / Data security / National security / Protected health information / Internet privacy / Information security / Personally identifiable information / Confidentiality / Ethics / Security / Privacy

November 20, 2014 MAC Binder Section 3 – Corrective Action Plans Part A Table of Contents  LOC to Anthem regarding ABC2014CR-1 dated October 1, 2014  Anthem Response to LOC regarding ABC2014CR-1 dated October 31,

Add to Reading List

Source URL: www.chfs.ky.gov

Language: English - Date: 2015-01-17 11:02:58
UPDATE