Security paper

Results: 6621



#Item
661Organized crime / Lone wolf / American Muslims / Anwar al-Awlaki / Islamic terrorism / Counter-terrorism / Leaderless resistance / State terrorism / Definitions of terrorism / Terrorism / National security / Violence

Microsoft Word - Lone Wolves Paper Post Event.docx

Add to Reading List

Source URL: www.icct.nl

Language: English - Date: 2012-05-24 06:57:43
662Electronic commerce / Computer law / Money / Criminal law / Law / Payment Card Industry Data Security Standard / Payment card industry / Identity theft / Payment card / Payment systems / Data privacy / Credit cards

The Top Three Reasons YOU Need to be PCI Compliant An Executive White Paper September 2010

Add to Reading List

Source URL: www.sawmill.net

Language: English - Date: 2010-09-27 16:29:28
663Medicine / Food and drink / Food science / Public health / Malnutrition / Food security / Nutrition Foundation of the Philippines /  Inc. / Network for Capacity Development in Nutrition / Health / Nutrition / Humanitarian aid

Women and Nutrition − Nutrition policy discussion paper No. 6 Table of Contents Women and Nutrition − Nutrition policy discussion paper No. 6.................................................................1 UNITE

Add to Reading List

Source URL: www.unscn.org

Language: English - Date: 2009-07-21 03:34:41
664Paper shredder / Crime / Shred-it / Identity theft / Law / Espionage / Shred / Security / Economic Espionage Act / Trade secret

Legislative and governance Fact sheets – usA What is the Economic Espionage Act? The Economic Espionage Act ofEEA) made it a criminal offence to steal trade secrets, defined as “all forms and types of financi

Add to Reading List

Source URL: shreditprovidence.com

Language: English - Date: 2014-01-27 12:42:22
665Mortgage industry of the United States / Mortgage / Subprime mortgage crisis / Personal finance / Real estate / MERS / Foreclosure / Mortgage loan / Helping Families Save Their Homes Act / Mortgage-backed security / United States housing bubble / Economics

WORKING PAPER NOUSING BANKRUPTCY TO REDUCE FORECLOSURES: DOES STRIP-DOWN OF MORTGAGES AFFECT THE SUPPLY OF MORTGAGE CREDIT? Wenli Li Federal Reserve Bank of Philadelphia

Add to Reading List

Source URL: www.phil.frb.org

Language: English - Date: 2014-12-02 14:23:17
666Certificate server / Public key certificate / Transport Layer Security / Certificate authority / Root certificate / Self-signed certificate / Internet Information Services / Windows / X.509 / Cryptography / Public-key cryptography / Key management

Installing and Configuring a Server Certificate for use by MailSite Fusion with TLS/SSL A guide for MailSite Administrators MailSite, Inc. technical White Paper

Add to Reading List

Source URL: www.mailsite.com

Language: English - Date: 2010-06-23 03:19:00
667Software licenses / Computer law / Electronic commerce / Open source / Social information processing / Standards / X Window System / Linux / Open-source software / Software / Computing / System software

Open Source Email Security Solutions: 10 Questions A strategic resource for IT decision-makers in small and medium size businesses A MailSite, Inc. White Paper

Add to Reading List

Source URL: www.mailsite.com

Language: English - Date: 2008-06-30 22:01:16
668System software / Internet / Data security / Firewall / Internet censorship / Great Firewall of China / Ping / Router / Google China / Computer network security / Computing / Cyberwarfare

This paper will appear at the 14th ACM Conference on Computer and Communications Security, Oct. 29-Nov. 2, 2007 ConceptDoppler: A Weather Tracker for Internet Censorship Jedidiah R. Crandall

Add to Reading List

Source URL: www.csd.uoc.gr

Language: English - Date: 2007-09-12 11:58:26
669Software engineering / Software architecture / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Service layer / Multitier architecture / Botnet / Slowloris / Denial-of-service attacks / Computing / Computer network security

TECHNICAL WHITE PAPER Web Application DoS/DDoS Testing Methodology Gunter Ollman Chief Technology Officer

Add to Reading List

Source URL: www.ioactive.com

Language: English
670Identity management / Identity theft / Privacy / Internet privacy / Authentication / Digital identity / Identity correlation / Security / Identity / Ethics

Who am I ? Dispelling the annoyingly persistent myth of a single answer Nigel Waters1 A Paper for [Id]entity 08 – a conference organised by the Office of the Victorian Privacy Commissioner, Melbourne, 12 November 2008

Add to Reading List

Source URL: cyberlawcentre.org

Language: English - Date: 2008-11-06 01:00:17
UPDATE