Security policy

Results: 30919



#Item
341European Union / Energy / Economy of Europe / Energy in the European Union / European Atomic Energy Community / Nuclear power / Energy policy of the European Union / Nuclear safety and security / Framework Programmes for Research and Technological Development / Nuclear power in the European Union / Outline of nuclear power

G_Van_Goethem ENYG_2015 ENS_Paris 23June2015

Add to Reading List

Source URL: enygf2015.org

Language: English - Date: 2015-07-22 06:54:38
342Privacy / Data security / Prevention / Computing / Bloomberg L.P. / Security / Bloomberg Tradebook / Bloomberg / Internet privacy / Information privacy / Medical privacy / Personally identifiable information

PRIVACY PRIVACY POLICY BLOOMBERG TRADEBOOK ® LLC and its Tradebook affiliates (“Bloomberg Tradebook”) respects the privacy rights of our users and is strongly committed to protecting your privacy online. This privac

Add to Reading List

Source URL: www.bbhub.io

Language: English - Date: 2016-06-17 14:39:25
343Cryptography / Security / Prevention / E-commerce / Crime prevention / Information governance / National security / Computer security / Certificate authority / Public key certificate / Information security / Password

PEXA Subscriber Security Policy Increment 3 PEXA System Security Policy VersionNovember 2014

Add to Reading List

Source URL: www.pexa.com.au

Language: English - Date: 2016-07-20 01:39:45
344Rape / Violence / Crime / Behavior / Sexual abuse / Sex crimes / Criminology / Gender studies / Laws regarding rape / Sexual assault / Statutory rape / Sexual violence

The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act SUNY Empire State College

Add to Reading List

Source URL: www.esc.edu

Language: English - Date: 2016-02-11 14:48:47
345Computer security / System software / Software / Trusted computing base / Mandatory access control / Security-Enhanced Linux / Kernel / Policy Monitoring / System call / XTS-400

The Case for Abstracting Security Policies   

Add to Reading List

Source URL: rich.recoil.org

Language: English - Date: 2006-04-13 14:58:02
346Security / Prevention / Safety / National security / Computer security / Crime prevention / Cryptography / Information governance / Information security / Continuous auditing / IT risk

Microsoft Word - Information Resource Activity Review Policy.docx

Add to Reading List

Source URL: it.ouhsc.edu

Language: English - Date: 2014-12-11 11:30:27
347Security / Prevention / Cyberwarfare / National security / United States Department of Homeland Security / Cybercrime / Hacking / Computer security / Cyberwarfare in the United States / Cyberspace / Cyber-attack / National Cyber Security Policy

The Collaboration Imperative for Cyberspace Stakeholders Author: Mr. Riley Repko, HQE to the Air Force Deputy Chief of Staff for Operations, Plans & Requirements Executive Summary I. Challenge Cyberspace is a core enable

Add to Reading List

Source URL: www.it-aac.org

Language: English - Date: 2015-06-22 12:07:28
348P3P / World Wide Web / Internet privacy / Computing / Privacy / Identity management / Computer security / Cyberspace / CUPS / Privacy policy / HTTP cookie / Medical privacy

A “Nutrition Label” for Privacy Patrick Gage Kelley,* Joanna Bresee,* Lorrie Faith Cranor,* Robert W. Reeder** * Carnegie Mellon University School of Computer Science

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-06-17 17:35:23
349Security / Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / Information governance / National security / Computer virus / Intellectual property / Internet privacy / Website

TERMS The use of this website is subject to the following Terms, the Privacy Policy and any addi:onal terms and condi:ons and no:ces displayed by us on this website from :me to :me (together ‘Terms’). In the Terms, "

Add to Reading List

Source URL: yarrabend.com.au

Language: English - Date: 2016-06-17 02:00:37
350Cryptography / Public-key cryptography / Public key infrastructure / Key management / Transport Layer Security / Cryptographic protocols / Certificate policy / Certificate authority / Public key certificate / Revocation list / X.509 / Kek

Microsoft Word - KEK-GRID-CPCPSdoc

Add to Reading List

Source URL: gridca.kek.jp

Language: English - Date: 2010-11-01 03:18:34
UPDATE