Security

Results: 374843



#Item
181Software / Computing / Free software / Secure communication / Dark web / Tor / Cryptographic protocols / Internet privacy / .onion / DuckDuckGo / Privacy Badger / Onion routing

Private browsing to stay safe online Online privacy and security: ● No such thing as perfect security and privacy (unless you decide to live completely off the grid). ● Today: some practical ways (i.e. which don’t

Add to Reading List

Source URL: alexanderlhicks.com

Language: English - Date: 2018-09-03 13:30:10
182Cryptocurrencies / Ethereum / Alternative currencies / Blockchains / Numismatics / Economy / Money / Cross-platform software / Initial coin offering / Token / Kin / Draft:Bancor protocol

A Securities Law Framework for Blockchain Tokens To estimate how likely a particular blockchain token is be a security under US federal securities law Refer to: full legal analysis Instructions Step 1: Copy to a new goog

Add to Reading List

Source URL: hacken.io

Language: English - Date: 2017-10-05 12:07:04
183Cryptography / Key management / Public-key cryptography / Public key infrastructure / Transport Layer Security / E-commerce / Certificate authority / Public key certificate / X.509 / Certificate Transparency / Wildcard certificate / Certificate policy

IKP: Turning a PKI Around with Decentralized Automated Incentives Stephanos Matsumoto Raphael M. Reischuk

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:33
184Marketing / World Wide Web / Terms of service / Computing / Internet privacy / Internet security / Google Analytics / HTTP cookie / Privacy policy / General Data Protection Regulation / Cloudflare / Web analytics

CoinCap.io, CoinCap Apps Online Privacy Notice Data protection and security are important to CoinCap ("CoinCap"; "we"), as is your trust in our company and services. CoinCap is committed to processing your personal data

Add to Reading List

Source URL: static.coincap.io

Language: English - Date: 2018-09-24 22:08:26
185Computer access control / Computer security / Access control / Password / Single sign-on / Security token / Google Authenticator / Self-service password reset / Password manager

Factsheet User self-services Combining efficiency and security Where helpdesks have to deal with large numbers of users, they are often full to capacity with simple, repetitive tasks. User self-services ease the pressu

Add to Reading List

Source URL: www.airlock.com

Language: English - Date: 2016-11-07 04:34:47
186Government / United States intelligence agencies / Executive branch of the United States government / Presidential directive / United States Department of Homeland Security / Homeland security / Terrorism

SeptAdministration of George W. Bush, 2003 Homeland Security Presidential Directive/HSPD–6—Directive on Integration and Use of Screening Information To Protect Against

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2018-07-02 12:33:14
187Computing / Software engineering / Computer programming / Data types / C++ / C / Primitive types / Software bugs / Pointer / Struct / Memory safety / C dynamic memory allocation

Runtime Detection of Temporal Memory Errors? Kostyantyn Vorobyov, Nikolai Kosmatov, Julien Signoles, and Arvid Jakobsson CEA, LIST, Software Reliability and Security Laboratory, PC 174, 91191 Gif-sur-Yvette France {kosty

Add to Reading List

Source URL: julien.signoles.free.fr

Language: English - Date: 2017-09-15 19:04:17
188Education / Learning / Education reform / Home / Homework / Standards-based education / Piazza / Coursework / Online education / CourseWork Course Management System

CIS 331 Introduction to Networks & Security Syllabus Syllabus

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2017-08-27 15:38:21
189Cryptocurrencies / Ethereum / Alternative currencies / Blockchains / Numismatics / Economy / Money / Cross-platform software / Initial coin offering / Token / Kin / Draft:Bancor protocol

A Securities Law Framework for Blockchain Tokens To estimate how likely a particular blockchain token is be a security under US federal securities law Refer to: full legal analysis Instructions Step 1: Copy to a new goog

Add to Reading List

Source URL: hacken.io

Language: English - Date: 2017-10-12 11:57:44
190Computing / Technology / Software development / AXA / CAC 40 / DevOps / Application security / Microsoft / M12 / Computer security

Contrast Security Announces Microsoft Ventures and AXA Strategic Ventures as Global Strategic Investors Investments signal criticality of securing software applications in the Cloud and DevOps Los Altos, Calif. — Decem

Add to Reading List

Source URL: www.axavp.com

Language: English - Date: 2018-04-06 05:48:02
UPDATE