Protection

Results: 313391



#Item
11Computer architecture / Computing / System software / Software bugs / Embedded operating systems / Electrical engineering / Stack buffer overflow / FreeRTOS / Protection ring / Buffer overflow protection / Internet of things / Memory protection

Poster: EPOXY—Enabling Robust Protection for Bare-metal Systems Abraham A. Clements∗ , Naif Saleh Almakhdhub† , Khaled S. Saab‡ , Prashast Srivastava† , Jinkyu Koo† , Saurabh Bagchi† , Mathias Payer† ∗

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 19:44:12
12Law / United States administrative law / Legal history / 106th United States Congress / African Growth and Opportunity Act / Rulemaking / Government

Federal Register / Vol. 67, NoMonday, February 11, Notices protection of investors or the public interest; (2) does not impose any significant burden on competition; and (3) does not have the effect of limi

Add to Reading List

Source URL: 34.232.160.87

Language: English - Date: 2002-02-13 10:46:34
13

DATENSCHUTZHANDBUCH DATA PROTECTION MANUAL Compliance mit der Datenschutz-Grundverordnung (DS-GVO) Compliance with the General Data Protection Regulation (GDPR)

Add to Reading List

Source URL: dg-datenschutz.de

Language: German - Date: 2018-06-03 19:03:30
    14Information privacy / Data security / Law / Privacy law / Data protection / Internet privacy / Terms of service / General Data Protection Regulation / Right to be forgotten / Data portability / Personally identifiable information / Google Analytics

    Privacy Policy Privacy Policy We are very delighted that you have shown interest in our enterprise. Data protection is of a particularly high priority for the management of the OXIAL. The use of the Internet pages of the

    Add to Reading List

    Source URL: www.oxial.com

    Language: English - Date: 2018-05-22 06:09:17
    15Data security / Law / Privacy law / Data protection / Information privacy / Privacy / Personally identifiable information / Data / General Data Protection Regulation / Data Protection Act

    The The New New Data Data Protection Protection Laws

    Add to Reading List

    Source URL: www.inforights.im

    Language: English - Date: 2018-07-31 09:15:35
    16Computer security / Cybercrime / Cyberwarfare / Computer network security / Security engineering / Computing / National security / Deception technology / Cyberattack / Intrusion detection system / Botnet / Denial-of-service attack

    Poster: A Website Protection Framework Against Targeted Attacks based on Cyber Deception Jianbao Lin*, Chaoge Liu†, Xiang Cui*†‡, Zhaopeng Jia* * Beijing University of Posts and Telecommunications, Beijing, China

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-15 12:53:26
    17Law / Privacy / Terms of service / Government / Politics and technology / Federal Trade Commission / Corporate crime / Electronic Privacy Information Center / Internet privacy / Google Buzz / Marc Rotenberg / DoubleClick

    July 17, 2018 The Honorable Robert Latta, Chairman The Honorable Janice Schakowsky, Ranking Member U.S. House Committee on Energy and Commerce Subcommittee on Digital Commerce & Consumer Protection 2125 Rayburn House Off

    Add to Reading List

    Source URL: www.epic.org

    Language: English - Date: 2018-07-17 13:38:48
    18Computer security / Security engineering / Prevention / Security / Crime prevention / Cryptography / Information governance / National security / Password / Operating system / Protection ring / Capability-based security

    The Protection of Information in Computer Systems JEROME H. SALTZER, SENIOR MEMBER, IEEE, AND MICHAEL D. SCHROEDER, MEMBER, IEEE Invited Paper Abstract - This tutorial paper explores the mechanics of

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2016-01-15 12:55:59
    19Computing / Software engineering / Computer programming / Functional languages / Web programming / HTML / Hacking / Cross-site scripting / Ajax / JavaScript / Code injection / HTTP cookie

    Precise client-side protection against DOM-based Cross-Site Scripting Ben Stock FAU Erlangen-Nuremberg Sebastian Lekies

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2018-02-20 10:22:48
    20Conflict resource / Minerals / World / Geography of Africa / Africa / Mining / Democratic Republic of the Congo

    Conflict Minerals Policy Introduction McLaren Applied Technologies (MAT) is committed to preventing conflict, building stability overseas, improving the protection of human rights and the rule of law. To this end, MAT ac

    Add to Reading List

    Source URL: static-mat-cdn.mclaren.com

    Language: English - Date: 2018-10-22 11:29:09
    UPDATE