Security paper

Results: 6621



#Item
331Computer security / Computer access control / Access control / Federated identity / Identity management / Computer network security / Identity documents / Electronic authentication / Authentication / Multi-factor authentication / Knowledge-based authentication / Password

White Paper Financial Services Identity Management in an era of tell-all and technology overload Protect your most priceless assets under management: Your customers.

Add to Reading List

Source URL: lexisnexis.com

Language: English - Date: 2014-10-15 08:43:58
332Computer network security / Computing / Computer security / Cyberwarfare / Firewall / Intrusion detection system / Outline of computer security / Wireless security

Invensys White Paper is now

Add to Reading List

Source URL: iom.invensys.com

Language: English - Date: 2015-05-08 05:42:47
333

Dynamic Network Security Deployment Under Partial Information (Invited Paper) George Theodorakopoulos John S. Baras

Add to Reading List

Source URL: users.cs.cf.ac.uk

Language: English - Date: 2012-09-20 10:47:23
    334

    Xerox® DocuShare® Private Cloud Service Security White Paper Table of Contents Overview

    Add to Reading List

    Source URL: docushare.xerox.com

    Language: English - Date: 2015-04-02 15:02:03
      335

      White Paper ucode Data Center 情報セキュリティ基本方針 Basic Principles of ucode Data Center Security T-Engine Forum

      Add to Reading List

      Source URL: www.uidcenter.org

      Language: Japanese - Date: 2010-09-29 02:01:46
        336

        This paper will appear at the 22nd USENIX Security Symposium in Washington, D.C., AugustThe Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions Tao Zhu

        Add to Reading List

        Source URL: www.cs.unm.edu

        Language: English - Date: 2013-06-28 16:36:45
          337

          Brotherly Love is a Battelfield by Chris Cummins Philadelphia City Paper, May 29 – June 4, 2003 With all the talk of increased security and terror alert systems, the fact that our government continues to overlook the v

          Add to Reading List

          Source URL: www.kaiju.com

          Language: English - Date: 2004-05-28 10:56:04
            338

            BUILDING BLOCK WHITE PAPER DOMAIN NAME SYSTEM-BASED SECURITY FOR ELECTRONIC MAIL

            Add to Reading List

            Source URL: nccoe.nist.gov

            Language: English - Date: 2015-07-17 19:31:31
              339

              Aquila Cameras by Liteye Systems www.Liteye.com Coastal and Harbour Security White Paper

              Add to Reading List

              Source URL: liteye.com

              Language: English - Date: 2015-04-05 08:59:04
                340Security / Computer security / Prevention / Computer network security / Crime prevention / Cryptography / National security / Vulnerability / Internet security / Application security / Cloud computing security / Wireless security

                White Paper Automotive Security Best Practices Recommendations for security and privacy in the era of the next-generation car.

                Add to Reading List

                Source URL: www.mcafee.com

                Language: English - Date: 2015-09-13 23:40:35
                UPDATE