Security service

Results: 24048



#Item
731Identity management / Computer access control / Computer network security / Authentication / Notary / Packaging / Knowledge-based authentication / Layered security / Analytics / Identity verification service / LexisNexis

White Paper The Role of Knowledge Based Authentication (KBA) In Identity Proofing Knowledge Based Authentication [KBA]

Add to Reading List

Source URL: lexisnexis.com

Language: English - Date: 2014-10-15 08:44:07
732Microsoft / Webmail / Password / Security / Outlook.com / Email / Self-service password reset / Password fatigue

Microsoft Word - VISITING Creating Your JHED-Outlook Live revdocx

Add to Reading List

Source URL: web.jhu.edu

Language: English
733

Universal Protection Service to Acquire Guardsmark Merger Produces the Largest U.S.-owned Security Company Memphis, TN and Santa Ana, CA (12:00 NOON CENTRAL TIME July 28, 2015)—Universal Protection Service, a division

Add to Reading List

Source URL: www.warburgpincus.com

Language: English - Date: 2015-07-29 17:00:24
    734

    Gun Control Legislation William J. Krouse Specialist in Domestic Security and Crime Policy November 14, 2012 Congressional Research Service

    Add to Reading List

    Source URL: fas.org

    Language: English - Date: 2014-05-06 13:51:56
      735Cyberwarfare / Computer security / Computer network security / Cybercrime / National security / Cyber-attack / Denial-of-service attack / Malware / Stuxnet / Botnet / Attack / Spyware

      Global Mapping of Cyber Attacks Ghita Mezzour, L. Richard Carley, Kathleen M. Carley 2014 CMU-ISR

      Add to Reading List

      Source URL: www.casos.cs.cmu.edu

      Language: English
      736Food and drink / Personal life / Health / Famines / Food security / Urban agriculture / Hunger in the United States / Food bank / Pantry / Hunger

      Coping With Hunger, 2010: Food Pantry Clients and Households in the Service Region of the Food Bank for Central and Northeast Missouri Project investigators and report authors: Matt Foulkes, Geography

      Add to Reading List

      Source URL: foodsecurity.missouri.edu

      Language: English - Date: 2012-09-20 12:35:11
      737Cloud infrastructure / Amazon Web Services / Amazon Virtual Private Cloud / Amazon Relational Database Service / Virtual private cloud / Amazon Route 53 / Amazon.com / Amazon Elastic Compute Cloud / Amazon S3 / Amazon ElastiCache / Amazon Simple Queue Service / Cloud computing

      Amazon Web Services – Overview of Security Processes August 2015 Amazon Web Services: Overview of Security Processes August 2015

      Add to Reading List

      Source URL: d0.awsstatic.com

      Language: English - Date: 2015-11-03 13:56:03
      738

      2012 DATA BREACH INVESTIGATIONS REPORT A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting and Information Security Service

      Add to Reading List

      Source URL: www.aipsi.org

      Language: English
        739Software / Computing / Social networking services / Data management / Data security / Personal /  Inc. / Cloud computing / Foursquare / Internet privacy / Android / Location-based service / Mobile app

        Privacy, Availability and Economics in the Polaris Mobile Social Network Christo Wilson, Troy Steinbauer, Gang Wang, Alessandra Sala, Haitao Zheng and Ben Y. Zhao Department of Computer Science, U. C. Santa Barbara, Sant

        Add to Reading List

        Source URL: www.cs.ucsb.edu

        Language: English - Date: 2011-02-11 14:21:36
        740

        2012 DATA BREACH INVESTIGATIONS REPORT A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting and Information Security Service

        Add to Reading List

        Source URL: www.security-finder.ch

        Language: English - Date: 2013-02-19 04:02:58
          UPDATE