User Activity Monitoring

Results: 21



#Item
11System software / Anti-spam / Content-control software / Content filtering / SpectorSoft / Proxy server / Internet censorship in Australia / Email filtering / Computing / Internet / Spam filtering

Internet Filtering vs. User Activity Monitoring[removed] | www.spectorsoft.com

Add to Reading List

Source URL: downloads.spectorsoft.com

Language: English - Date: 2012-08-16 07:13:26
12Data / Database activity monitoring / Information / Database security / Database / ISight / Data management / Business intelligence / Intelligence

a Teleran solution brief BI/Data Warehouse Visibility and Control Improving Performance, Compliance and Business Value Identifies Inefficient User Behavior, Applications & Operations

Add to Reading List

Source URL: www.teleran.com

Language: English - Date: 2012-04-17 09:39:16
13Computing / Security / Cloud computing security / Information security / Cloud backup / Threat / Platform as a service / Database activity monitoring / IBM cloud computing / Cloud computing / Computer security / Centralized computing

Preparing to take the Certificate of Cloud Security Knowledge (CCSK) A Cloud Security Alliance Guide Welcome to the Certificate of Cloud Security Knowledge (CCSK), the industry’s first user certification for secure clo

Add to Reading List

Source URL: cloudsecurityalliance.org

Language: English - Date: 2013-02-22 01:28:57
14Cross-platform software / Oracle Database / Oracle Corporation / Oracle Fusion Middleware / Oracle Enterprise Manager / Software / Business software / Computing

Oracle Fusion Middleware User’s Guide for Oracle Business Activity Monitoring

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2012-09-20 03:54:06
15Cross-platform software / Oracle Database / Oracle Corporation / Oracle Fusion Middleware / Oracle Enterprise Manager / Software / Business software / Computing

Oracle Fusion Middleware User’s Guide for Oracle Business Activity Monitoring

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2013-06-13 16:43:16
16Federal Bureau of Investigation / Privilege / User / Information security / Internet privacy / Ring / Public safety / Privileged Identity Management / Database activity monitoring / Computer security / Security / Computing

Microsoft Word - FD-889a.doc

Add to Reading List

Source URL: www.dps.texas.gov

Language: English - Date: 2013-05-01 08:25:48
17Principle of least privilege / Raytheon / Privilege / Ring / Threat / Privileged Identity Management / Database activity monitoring / Computer security / Cyberwarfare / Computing

Privileged Users: Superman or Superthreat? A Privileged User Risk Whitepaper Prepared by: Raytheon Cyber Products Company

Add to Reading List

Source URL: www.raytheon.com

Language: English - Date: 2014-09-29 01:23:36
18Telemarketing / Broadband / Electronic engineering / Technology / Internet access / Personally identifiable information / Internet privacy / National Telecommunications and Information Administration / Internet in the United States / Electronics / Customer proprietary network information / Telecommunications

Website Monitoring. Baja Broadband’s websites use the browser feature called “cookies” to help monitor user activity on our websites. “Cookies” are generally short strings of unique random text or numbers that

Add to Reading List

Source URL: www.bajabroadband.com

Language: English - Date: 2013-05-14 06:48:20
19Measuring instruments / Measurement / Electricity meter / Nonintrusive load monitoring / Small appliance / Bluetooth low energy / Appliance / Server / Technology / Electric power / Electromagnetism

EnergyLens: Combining Smartphones with Electricity Meter for Accurate Activity Detection and User Annotation Manaswi Saha† , Shailja Thakur† , Amarjeet Singh† , Yuvraj Agarwal‡ † †

Add to Reading List

Source URL: www.synergylabs.org

Language: English - Date: 2014-04-17 15:19:21
20Federal Bureau of Investigation / Privilege / User / Information security / Internet privacy / Ring / Public safety / Privileged Identity Management / Database activity monitoring / Computer security / Security / Computing

Microsoft Word - FD-889a.doc

Add to Reading List

Source URL: www.txdps.state.tx.us

Language: English - Date: 2013-05-01 08:25:48
UPDATE