Security University

Results: 12075



#Item
241

THE UNIVERSITY OF MAINE ANNUAL SAFETY REPORT Compliance Document for Jeanne Clery Disclosure Act of Campus Security Policy and Campus Crime Statistics Act of 1998" (as

Add to Reading List

Source URL: umaine.edu

- Date: 2015-11-20 14:23:14
    242

    Courses  for  understanding  the  impact  of  privacy  and  security  choices   Emily  McReynolds   Program  Director,  Tech  Policy  Lab   University  of  Washing

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    - Date: 2015-07-17 22:36:03
      243

      Wadham College Information Security Policy 1. Introduction In July 2012 the University of Oxford approved its Information Security policy that had been created

      Add to Reading List

      Source URL: www.wadham.ox.ac.uk

      - Date: 2015-09-07 06:56:09
        244

        Investigating the Computer Security Practices and Needs of Journalists Susan E. McGregor, Columbia Journalism School; Polina Charters, Tobin Holliday, and Franziska Roesner, University of Washington https://www.usenix.or

        Add to Reading List

        Source URL: www.usenix.org

        - Date: 2016-02-22 01:46:49
          245

          Your Cloud in my Company: Modern Rights Management Services Revisited Martin Grothe, Paul Rösler, Johanna Jupke, Jan Kaiser, Christian Mainka and Jörg Schwenk Horst Görtz Institute for IT Security, Ruhr-University Boc

          Add to Reading List

          Source URL: www.nds.rub.de

          - Date: 2016-08-02 09:02:23
            246

            An Improved Attack for Recovering Noisy RSA Secret Keys and its Countermeasure Noboru Kunihiro The University of Tokyo, Japan November 24th, 2015

            Add to Reading List

            Source URL: security-lab.jaist.ac.jp

            - Date: 2015-11-22 02:25:22
              247

              Review of Economic Dynamics 2, 575–Article ID redy, available online at http://www.idealibrary.com on Projected U.S. Demographics and Social Security* Mariacristina De Nardi University of Chicago a

              Add to Reading List

              Source URL: users.nber.org

              - Date: 2004-12-08 18:26:26
                248

                Draft of a Dynamic Malware Detection System on Trustworthy Endpoints Andreas Speier . Christofer Fein . David Bothe Eric Reich . Norbert Pohlmann Institute for Internet Security Westphalian University of Applied Sciences

                Add to Reading List

                Source URL: norbert-pohlmann.com

                - Date: 2015-12-20 08:05:33
                  249

                  PROPOSED POLICY P02Mobile Device Security Policy University employees and students who use a laptop computer or mobile device (e.g. portable hard drives, USB flash drives, smartphones, tablets) are responsibl

                  Add to Reading List

                  Source URL: alaska.edu

                  - Date: 2015-02-18 18:41:14
                    250

                    University of California - Riverside 2015 Annual Security Report (Clery Act) Crime Statistics Collection Formm Department:__________________________________________ Extension:_____________ MAIL COMPLETED FORM TO: Federal

                    Add to Reading List

                    Source URL: police.ucr.edu

                    - Date: 2016-04-18 15:57:45
                      UPDATE