Security policy

Results: 30919



#Item
901Hypertext Transfer Protocol / Cross-site request forgery / Internet privacy / JavaScript / Ajax / Computer network security / Same-origin policy / Cross-site scripting / HTTP cookie / Referer spoofing / Session fixation / XMLHttpRequest

Robust Defenses for Cross-Site Request Forgery Adam Barth Collin Jackson Stanford University

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2008-10-31 13:52:34
902Computer network security / Cybercrime / Computer security / Cryptography / Cyberwarfare / National security / Password / Email / Mobile computing / Internet / Server / Greek Orthodox Archdiocese of America

General Policy and Procedure on Technology Prepared by the Office of Information Technology AprilAdopted by Administrative Council June 7, 2010)

Add to Reading List

Source URL: www.arch-no.org

Language: English - Date: 2014-06-19 13:44:40
903Energy policy / Energy economics / Renewable energy commercialization / Energy transition / Renewable energy / Energy policy of the United Kingdom / Draft:German National Action Plan on Energy Efficiency

Brussels, 23rd September 2014 Office of the Head of State Address Re: European Energy Security Strategy – Renovation of buildings is the solution Dear Head of State,

Add to Reading List

Source URL: www.hupfas.hr

Language: English - Date: 2014-10-01 13:49:58
904United States Department of Homeland Security / Visa Waiver Program / Visa policy of the United States / Guam / U.S. Customs and Border Protection / Travel visa

DEPARTMENT OF HOMELAND SECURITY OMB NoExpiresU.S. Customs and Border Protection

Add to Reading List

Source URL: ilw.com

Language: English - Date: 2012-09-10 14:50:13
905Tax credits / Taxation in the United Kingdom / Taxation / Employment compensation / Income distribution / Working tax credit / Earned income tax credit / Income tax in the United States / Social Security / Means-tested benefit / Family Credit / Child tax credit

Millar, JTax Credits. In: Understanding Social Security.2nd ed. Policy Press, Bristol, ppISBNLink to official URL (if available): http://www.policypress.co.uk/display.asp?K=

Add to Reading List

Source URL: opus.bath.ac.uk

Language: English - Date: 2016-08-02 12:29:46
906Food politics / Food security / Education in Ghana / Ghana School Feeding Programme / Poverty reduction / Hunger / Millennium Development Goals / Policy analysis / Sustainability / Poverty / School feeding in low-income countries / National Association of NGOs

GOVERNMENT OF GHANA DRAFT NATIONAL SCHOOL FEEDING POLICY NOVEMBER, 2015

Add to Reading List

Source URL: www.ghana.gov.gh

Language: English - Date: 2016-01-05 04:46:50
907

PB&J Restaurants PHI and other sensitive data Security Policy. I. II.

Add to Reading List

Source URL: www.eatpbj.com

Language: English - Date: 2014-11-14 17:28:10
    908Climate change policy / Carbon finance / Emissions trading / Environmental economics / Regional Greenhouse Gas Initiative / Western Climate Initiative / Carbon tax / Carbon emission trading / American Clean Energy and Security Act / Climate change mitigation / Regional climate change initiatives in the United States / International Carbon Action Partnership

    CLOSUP Working Paper Series Number 35 April 2015 The Durability of Carbon Cap-and-Trade Policy

    Add to Reading List

    Source URL: closup.umich.edu

    Language: English - Date: 2015-06-03 12:44:21
    909Committee / Human communication / Law / Meetings / Parliamentary procedure / Political communication / Public Interest Declassification Board / Interagency Security Classification Appeals Panel

    POLICY MANUAL DEPARTMENT OF CHEMISTRY UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN TABLE OF CONTENTS I.

    Add to Reading List

    Source URL: www.chemistry.illinois.edu

    Language: English - Date: 2016-02-12 16:20:46
    910Computer network security / Multi-agent systems / Spamming / Botnets / United States v. Nosal / Computer Fraud and Abuse Act / Zombie / Computer worm / Mariposa botnet / Conficker / Rustock botnet / Srizbi botnet

    Testimony of Amie Stepanovich  Senior Policy Counsel, Access  on behalf of   Access and the Electronic Frontier Foundation  Before the Advisory Committee on Criminal Rules  on the Matter of P

    Add to Reading List

    Source URL: www.accessnow.org

    Language: English - Date: 2015-09-14 16:04:23
    UPDATE