Security Information Service

Results: 3404



#Item
281Internet Relay Chat / Cyberwarfare / Videotelephony / Ident / Distributed firewall / Firewall / Skype / Denial-of-service attack / Secure Shell / Software / Computing / Computer network security

Delegating Network Security with More Information Jad Naous Ryan Stutsman Stanford University

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2012-10-04 00:45:33
282Login / Computer security / Identity management systems / Self-service password reset / Access control / Security / Password

Teamsoft : How to reset the password of an user Additional Information Introduction This document presents information for resetting the password of a TeamAgenda user.. I need to reset the password for a user or a user h

Add to Reading List

Source URL: www.teamsoft.com

Language: English - Date: 2007-03-02 13:15:08
283Security / Privacy / Crime prevention / National security / Computer security / Service-level agreement / P3P / Information privacy / Internet privacy / Computing / Cloud computing / Centralized computing

Data Protection-Aware Design for Cloud Computing

Add to Reading List

Source URL: www.hpl.hp.com

Language: English - Date: 2009-11-12 19:56:01
284Law in the United Kingdom / Security clearance / Information security / Public safety / National security / Security / Adjudicator

Defense Security Service Academy

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 14:44:18
285Cyberwarfare / Crime prevention / National security / Electronic commerce / Vulnerability / Managed security service / Information security / Security / Computer network security / Computer security

The War on Security Can(not) Be Won The War on Security Can(not) Be Won A CIOview White Paper by Scott McCready

Add to Reading List

Source URL: www.cioview.com

Language: English - Date: 2005-12-12 17:11:30
286Cyberwarfare / Data security / Crime prevention / National security / Application firewall / Vulnerability / Information security / Application security / Managed security service / Computer network security / Computer security / Security

Secure Architecture Research Report

Add to Reading List

Source URL: www.cgisecurity.com

Language: English - Date: 2008-11-02 15:38:33
287Business / Customs / Security / U.S. Customs and Border Protection / National Technical Information Service / Export / Political geography / International trade / International relations / International law

Australian Customs Cargo Advice NumberChanges to administering low value end-use Securities Background Australian Customs and Border Protection Service (Customs and Border Protection)

Add to Reading List

Source URL: cargosupport.gov.au

Language: English - Date: 2012-02-15 17:43:33
288Statement on Auditing Standards No. 70: Service Organizations / Finance / Internal control / Security controls / Information technology audit / Auditing / Accountancy / Risk

PDF Document

Add to Reading List

Source URL: bswllc.com

Language: English - Date: 2014-01-02 11:15:20
289Cloud computing / Computer network security / Security information and event management / Managed security service / IBM cloud computing / Clone Systems /  Inc. / Computing / Centralized computing / Computer security

PDF Document

Add to Reading List

Source URL: www.solutionary.com

Language: English - Date: 2014-04-09 15:10:09
290Computer security / Sourcefire / Management / Security information and event management / Managed services / Snort / Service provider / Business / Software / Computer network security

PDF Document

Add to Reading List

Source URL: www.emulex.com

Language: English
UPDATE