Security University

Results: 12075



#Item
601Arkansas / Email / Arc @ UNSW Limited / University of Arkansas / Bureau of Diplomatic Security

Page  1  of  5     Registered  Student  Organization  Packet  2016-­‐2017   University  of  Arkansas  

Add to Reading List

Source URL: osa.uark.edu

Language: English - Date: 2016-07-12 15:10:02
602Security / Prevention / National security / Mass surveillance / Crime prevention / Law enforcement / Surveillance / National Security Agency / Internet privacy / Cloud computing / Internet / Edward Snowden

On the Feasibility of a Technological Response to the Surveillance Morass Joan Feigenbaum and J´er´emie Koenig Yale University, New Haven CT, USA E-mail: {joan.feigenbaum, jeremie.koenig}@yale.edu

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2014-05-31 10:55:23
603Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Computer virus / Zero-day / Avira / Rogue security software / IObit / Bleeping Computer

C A S E S T U DY Imperial College gives malware a failing grade With Malwarebytes Anti-Malware for Business, the university proactively protects valuable intellectual property on thousands of PCs

Add to Reading List

Source URL: fr.malwarebytes.com

Language: English - Date: 2016-07-07 18:35:52
604Issa / Information Systems Security Association / National Register of Historic Places in St. Joseph County /  Indiana / University of Notre Dame

Student Volunteer Information Form Name: ______________________________________________ Contact Information: Address: ________________________________________ City: ______________________

Add to Reading List

Source URL: international.nd.edu

Language: English - Date: 2015-09-25 11:40:02
605Microsoft / Software / Password / Security / Email / Point and click / Outlook.com

Missouri University of Science and Technology Responsible Conduct of Research (RCR) Training Go to _www.citiprogram.org_. If you are a new user, you must register in CITI. Click on “New Users Register Here” link –

Add to Reading List

Source URL: grad.mst.edu

Language: English - Date: 2015-02-18 18:07:14
606Prevention / Security / Safety / Crime prevention / Surveillance / Law enforcement / National security / Closed-circuit television / China Central Television / Occupational safety and health

UNIVERSITY OF COPENHAGEN Guidelines for CCTV surveillance and use of logfiles for electronic access 1. Background and purpose

Add to Reading List

Source URL: personalepolitik.ku.dk

Language: English - Date: 2015-05-21 04:42:26
607Semantic Web / Computer security / Access control / Security / Computing / Ontology / Knowledge engineering / Computer access control / Role-based access control / Description logic / Web Ontology Language / Lightweight ontology

PhD Dissertation International Doctorate School in Information and Communication Technologies DIT - University of Trento

Add to Reading List

Source URL: disi.unitn.it

Language: English - Date: 2014-09-10 09:40:14
608Security / Prevention / Safety / National security / Crime prevention / Background check / Employment / Law enforcement / Recruitment / Chancellor / Computer security

Security Sensitive and/or Critical Positions The University of Illinois requires that all individuals, who are offered employment positions deemed by the University to be security sensitive and/or critical, undergo backg

Add to Reading List

Source URL: www.hr.uic.edu

Language: English - Date: 2016-03-09 17:57:02
609Computing / New Mexico / Prevention / Computer security / Data security / University of New Mexico / V-12 Navy College Training Program / Web 2.0 / Web application / Internet privacy / Provisioning / Information security

Technology Days gives UNM’s faculty, staff, and students an opportunity to learn about technologies on campus and participate in discussions of the current state of technology and future innovations at UNM. • Provi

Add to Reading List

Source URL: techdays.unm.edu

Language: English - Date: 2016-06-14 17:14:47
610Computing / Software / Application software / Scientific method / Salvatore J. Stolfo / User / Milgram experiment / Statistics / ROOT / Internet privacy / Data analysis / Windows Vista

On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned Malek Ben Salem and Salvatore J. Stolfo Computer Science Department Columbia University

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-07-08 13:42:25
UPDATE