Uploads
Contact
/
Login
Upload
Search Results for 'User Security'
User-Centric Permissions for Mobile Devices
celsa-spraggs
Design of cyber security awareness game utilizing a social
min-jolicoeur
IBM ® System z - Mainframe:
liane-varnes
Program Analysis for Web Application Security
cheryl-pisano
TRENDS & NETWORK SECURITY
debby-jeon
Introduction to Usable Security
tawny-fly
Security and Usability Rachel Greenstadt
aaron
Lecture 6: Smart Phone Security
kittie-lecroy
Mobile Device and Platform Security – Part II
alida-meadow
HIPAA Security Awareness
stefany-barnette
Mobile Device and Platform Security – Part II
tatyana-admore
HIPAA Security Awareness
olivia-moreira
Utilising human factors in the science of security
stefany-barnette
Security Guide for Interconnecting Information Technology S
karlyn-bohler
1 The Data and Application Security and Privacy (DASPY) Cha
giovanna-bartolotta
Introduction to Usable Security
ellena-manuel
1 The Data and Application Security and Privacy (DASPY) Cha
aaron
Cyber Security Defenses: What Works Today
min-jolicoeur
The Unexpected Dangers of Dynamic JavaScript
min-jolicoeur
The Habits of Highly Successful Security Awareness Programs
briana-ranney
Modern Network Security Threats
myesha-ticknor
State-of-the-Art and Challenges for the Internet of Things Security
tatyana-admore
Password Security Module 8
luanne-stotts
System Admin Security Training
calandra-battersby
1
2
3
4
5
6
7
8