Privacy

Xem 1-20 trên 356 kết quả Privacy
  • Tiểu luận môn học An toàn, an ninh thông tin: Mã hóa dữ liệu và xác thực PGP (Pretty Good Privacy) trình bày tổng quan an toàn an ninh thông tin; mã hóa và xác thực PGP – Pretty Good Privacy; ứng dựng PGP mã hóa, xác thực mail trên Thunderbird.

    doc26p levuphongqn 18-08-2015 53 21   Download

  • You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure.

    pdf336p titatu_123 01-03-2013 39 15   Download

  • Ngoài phần Mở đầu và Kết luận, tiểu luận gồm 2 chương: Mã hóa và xác thực PGP – Pretty good privacy, ứng dựng PGP mã hóa, xác thực Mail Thunderbird.

    doc28p levuphongqn 18-08-2015 25 13   Download

  • Bảo vệ sự riêng tư với Steganos Privacy Suite 10 bản quyền miễn phí Steganos Privacy Suite 12 hiện được bán với giá 49.95 Euro, nhưng với chương trình hợp tác hiện tại giữ Steganos và PC-World, bạn có cơ hội dùng miễn phí phiên bản 10 của phần mềm này

    pdf3p kemoc5 06-06-2011 54 3   Download

  • An Overview of Cloud Security and Privacy includes about Cloud services delivery model, Impact of cloud computing on the governance structure of IT organizations, Companies are still afraid to use clouds, Taxonomy of Fear, Attacker Capability, Infrastructure Security, Data Security and Storage.

    ppt46p cocacola_17 11-12-2015 8 3   Download

  • After studying this chapter, you should be able to: Identify and explain controls designed to protect the confidentiality of sensitive corporate information; identify and explain controls designed to protect the privacy of personal information collected from customers, employees, suppliers, or business partners; explain how the two basic types of encryption systems work.

    ppt9p tangtuy17 05-07-2016 2 2   Download

  • Computer Security: Chapter 2 - Introduction to Privacy in Computing (incl. technical and legal privacy controls) Introduction, Recognition of the need for privacy, Threats to privacy, Privacy Controls, Selected Advanced Topics in Privacy.

    ppt52p cocacola_17 11-12-2015 11 1   Download

  • Computer Security: Chapter 3 - Privacy Enhancing Technologies (PET) includes about PET, Encryption Tools, Policy Tools, Filtering Tools, SPAM Filters, Cookie Cutters, Anonymity Tools, Autonomy Enhancing Technology, Seclusion Enhancing Technologies.

    ppt24p cocacola_17 11-12-2015 7 1   Download

  • Computer Security: Chapter 10 - P2D2 - A Mechanism for Privacy-Preserving Data Dissemination Introduction (Interactions and Trust, Building Trust, Recognition of Need for Privacy Guarantees,...), Problem and Challenges, Proposed Approach, Prototype Implementation.

    ppt38p cocacola_17 11-12-2015 10 1   Download

  • Trust-based Privacy Preservation for Peer-to-peer Data Sharing provides about Problem statement, Proposed solution, Related work, Privacy measurement, Mitigating collusion, Trust based privacy preservation scheme, Trustworthiness of peers.

    ppt20p cocacola_17 11-12-2015 7 1   Download

  • Privacy-Preserving Cross-Domain Data Dissemination and Adaptability in Trusted and Untrusted Cloud introduction about Problem Statement, Distributed Service Monitoring Approach, Distributed Service Monitoring, Agile Defense and Adaptability.

    ppt64p cocacola_17 11-12-2015 7 1   Download

  • Privacy and Identity Management in Cloud includes about Motivation, Identity Management (IDM), Goals of Proposed User-Centric IDM, Mechanisms, Description of proposed solution, Advantages of the Proposed Scheme, Conclusion & Future Work.

    ppt23p cocacola_17 11-12-2015 10 1   Download

  • Bộ tài liệu hacker highschool sẽ giúp bạn biết nên học những gì để trở thành một hacker. Đây là tập 10 của bộ 13 tập.

    pdf24p narutofan 07-09-2010 200 109   Download

  • I hope that this book is as much fun to read as it was to research and write. My goal was to cover all the major topics surrounding computer security: hackers, viruses, and the rapid erosion of personal privacy. These are fascinating subjects. You feel as if you’re watching a great game that might take decades to finish, if it is ever truly finished. A clever hacker scores a point by breaching security, then the other side (the government or some other member of the anti-hacker team) scores by nabbing the hacker, then another hacker steps up to bat with a new tactic, and so on. Back...

    pdf50p ptng13 16-05-2012 59 30   Download

  • Who This Book Is For The target audience for this book is the Information Worker (IW), someone who works within an organization and whose primary job responsibility involves sharing, communicating, processing, or acting upon information stored on computer systems and networks. Workers in organizations of all sizes, from small businesses to large enterprises, will benefit from this book.

    pdf98p fangfangfang 06-04-2012 58 16   Download

  • To fully understand privacy on Facebook, and how it's likely to evolve, you need to understand one thing. In short: Facebook executives want everyone to be public. As the service evolves executives tend to favour open access to information, meaning as time marches on information you think is private will slowly become public.

    pdf52p haitk38 27-04-2011 54 15   Download

  • Nội dung báo cáo gồm có: Giới thiệu về PGP, hoạt động mã hóa dữ liệu của PGP, hoạt động xác thực của PGP, Demo ứng dụng PGP mã hóa mail trên Thunderbird.

    ppt14p levuphongqn 18-08-2015 43 13   Download

  • The literature was reviewed and summarized to provide common interpretations of human figure drawings. Basic guidelines for interpreting human figure drawings (i.e., face and head, body, arms and hands, and legs and feet) are presented. Expectations for students at different developmental levels (ages 1 1/2 through adolescence) are identified, and the influence of artistic talent is discussed. Two children's drawings from case studies in a school setting are interpreted.

    pdf0p trongminh123 19-10-2012 48 12   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article A Novel Distributed Privacy Paradigm for Visual Sensor Networks Based on Sharing Dynamical Systems

    pdf17p dauphong20 10-03-2012 22 6   Download

  • Các phần mềm gián điệp – Spyware ngày càng phát triển đa dạng hơn về số lượng cũng như cách thức hoạt động cũng tinh vi hơn rất nhiều. Và gần đây nhất, chúng bắt đầu chuyển hướng tập trung nhiều hơn vào quá trình xâm nhập qua hệ thống history bên trong trình duyệt của người sử dụng, qua đó dễ dàng thu thập được nhiều thông tin về những trang web họ đã từng ghé thăm, ngay cả trong chế độ privacy (cookies hoàn toàn không có tác dụng).

    pdf10p kmkmkmkmkm 07-09-2012 30 6   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản