Security paper

Results: 6621



#Item
691Crime prevention / Data security / Information security / National security / Computer file / Portable Document Format / Filesystem permissions / File system / Email client / Computing / Security / Computer security

AirZip® FileSECURE™ White Paper Communicate with Confidence™ Introduction Keeping personal or sensitive information confidential is an essential aspect when doing business today. The disclosure of confidential infor

Add to Reading List

Source URL: www.airzip.com

Language: English - Date: 2009-02-03 18:32:31
692Computing / Domain Name System Security Extensions / Domain name / Name server / Root name server / Top-level domain / OpenDNSSEC / Comparison of DNS server software / Domain name system / Internet / Network architecture

A paper on DNSSEC NSEC3 with Opt-Out DNSSEC – A Way Forward for TLD Registries Method for faster adoption of DNSSEC Providing greater security with minimal impact on customers, registries and Zone Management

Add to Reading List

Source URL: communitydns.net

Language: English - Date: 2011-03-29 05:11:52
693Data security / System administration / Password / Computer security / Usability / Su / Information security / Security / Crime prevention / National security

Agent-Based Modeling of User Circumvention of Security Position Paper Vijay Kothari Jim Blythe

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2014-06-10 16:10:16
694Structure / Sociology / Non-governmental organization / Philanthropy / Political science

GRANT ASSISTANC FOR GRASSROOTS HUMAN SECURITY PROJECT 2013 CONCEPT PAPER FORM Prepared on2014

Add to Reading List

Source URL: www.jamaica.emb-japan.go.jp

Language: English - Date: 2014-05-13 19:13:48
695United Nations Security Council / Africa / Hassan Bubacar Jallow / Rwandan Genocide / Augustin Bizimana / Juvénal Uwilingiyimana / Grégoire Ndahimana / Arusha / Rwanda / International Criminal Tribunal for Rwanda

Topic 4(b): The International Criminal Tribunal for Rwanda - Completion Strategy Research paper prepared by: Beth Hackney

Add to Reading List

Source URL: redcross.org.au

Language: English - Date: 2015-05-29 03:00:56
696Law / 106th United States Congress / Computer law / Gramm–Leach–Bliley Act / United States federal banking legislation / Internet privacy / Information security / Paper shredder / Privacy / Security / Ethics / Privacy law

Legislative and governance Fact sheets – usA What is the Gramm-Leach-Bliley Act? The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLB Act), protects the privacy of consumer informatio

Add to Reading List

Source URL: shreditprovidence.com

Language: English - Date: 2014-01-27 12:42:30
697Security / Information technology audit / Computer security / Network management / Syslog / Operating system / File system / Access control / Information technology audit process / Auditing / Information technology management / Computing

Secure4Audit (auditGUARD) A Technical White Paper NOTICE As auditGUARD is a software product which is subject to change, S4Software, Inc. reserves the right to make changes in the specifications and other information co

Add to Reading List

Source URL: www.s4software.com

Language: English - Date: 2005-01-25 07:01:00
698Data privacy / Law / Computer law / Human rights / Legal aspects of computing / Information privacy / Internet privacy / Personal Information Protection and Electronic Documents Act / Data Protection Act / Privacy law / Ethics / Privacy

DRAFT Working Paper No 1 Interpreting the Security Principle v.6 March 2007

Add to Reading List

Source URL: www.cyberlawcentre.org

Language: English - Date: 2013-12-09 02:30:14
699Financial crises / Systemic risk / Banking / Financial markets / Bank run / Basel III / Security / Corporate finance / Bank / Financial economics / Economics / Finance

ISSNDEPARTMENT OF ECONOMICS DISCUSSION PAPER SERIES JOINTLY OPTIMAL REGULATION OF BANK CAPITAL

Add to Reading List

Source URL: www.economics.ox.ac.uk

Language: English - Date: 2014-09-25 06:46:39
700Internet standards / Quasar / Q-Zar / File Transfer Protocol / Computer file / Computer security / File format / Computing / Internet / Network architecture

Interfacing with Quasar a White Paper from Joven Technology Quasar can accept delivery of project, report, and/or status information in a number of ways. In general, data transfer takes place by “pushing” files from

Add to Reading List

Source URL: www.joventech.com

Language: English - Date: 2013-11-17 00:51:16
UPDATE