Listing 1 - 10 of 70 << page
of 7
>>
Sort by

Book
An Act to Amend Title 28, United States Code, to Require the Attorney General to Share Criminal Records with State Sentencing Commissions, and for Other Purposes
Author:
Year: 2011 Publisher: [Washington, D.C.] : [U.S. G.P.O.],

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Proceedings of the International Conference on Security and Cryptography : SECRYPT 2011 : 18-21 July, 2011, Seville, Spain
Author:
ISBN: 1467302031 9898425717 Year: 2011 Publisher: Piscataway, NJ : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The purpose of SECRYPT 2011, the International Conference on Security and Cryptography, is to bring together researchers, mathematicians, engineers and practitioners interested on security aspects related to information and communication Theoretical and practical advances in the fields of cryptography and coding are a key factor in the growth of data communications, data networks and distributed computing In addition to the mathematical theory and practice of cryptography and coding, SECRYPT also focuses.


Book
Influences on the adoption of multifactor authentication
Authors: --- ---
Year: 2011 Publisher: Santa Monica, CA : RAND Corporation,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Passwords are presently the primary method by which users authenticate themselves to computer systems. But passwords are proving less and less capable of protecting systems from abuse. Multifactor authentication (MFA)⁰́₄which combines something you know (e.g., a PIN), something you have (e.g., a token), and/or something you are (e.g., a fingerprint)⁰́₄is increasingly being required. This report investigates why organizations choose to adopt or not adopt MFA⁰́₄and where they choose to use it. The authors reviewed the academic literature and articles in the trade press and conducted structured conversations with selected organizations that use or have contemplated using MFA. They found that the type of organization⁰́₄for example, defense contractor, bank, hospital⁰́₄affected its MFA choices. MFA is mandated for U.S. government agencies, which tend to use PINs and tokens for remote access. Among private users of MFA, tokens that generate one-time passwords, rather than biometrics, predominate. The researchers recommend that the U.S. government develop methodologies by which the costs and benefits of mandating MFA can be evaluated. Guidance by the National Institute of Standards to government agencies may be useful in helping them sort out the various arguments for and against mandating MFA in a given sector.


Book
Cyber crime : updating the Computer Fraud and Abuse Act to protect cyber space and combat emerging threats : hearing before the Committee on the Judiciary, United States Senate, One Hundred Twelfth Congress, first session, September 7, 2011.
Author:
Year: 2011 Publisher: Washington : U.S. G.P.O.,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Legislative proposals to address concerns over the SEC's new confidentiality provision : hearing before the Committee on Financial Services, U.S. House of Representatives, One Hundred Eleventh Congress, second session, September 16, 2010.
Author:
Year: 2011 Publisher: Washington : U.S. G.P.O.,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Personal ID verification : agencies should set a higher priority on using the capabilities of standardized identification cards report to congressional committees.
Author:
Year: 2011 Publisher: [Washington, D.C.] : U.S. Govt. Accountability Office,


Book
Access with attitude
Authors: ---
ISBN: 0821443593 9780821443590 0821419390 9780821419397 9780821419397 0821419390 Year: 2011 Publisher: Athens Ohio University Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

For those who find themselves in a battle for public records, Access with Attitude: An Advocate's Guide to Freedom of Information in Ohio is an indispensable weapon. First Amendment lawyer David Marburger and investigative journalist Karl Idsvoog have written a simply worded, practical guide on how to take full advantage of Ohio's so-called Sunshine Laws. Journalists, law firms, labor unions, private investigators, genealogists, realty companies, banks, insurers-anyone who regularly needs access to publicly held information-will find this comprehensive and contentious guide to be invaluable.


Periodical
Agency chief Freedom of Information Act officer report for ...
Author:
Year: 2011 Publisher: [Washington, D.C.] : Department of Defense, Director of Administration and Management,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Network neutrality and Internet regulation : warranted or more economic harm than good? : hearing before the Subcommittee on Communications and Technology of the Committee on Energy and Commerce, House of Representatives, One Hundred Twelfth Congress, first session, February 16, 2011.
Author:
Year: 2011 Publisher: Washington : U.S. G.P.O.,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
CCTE : 10th Conference of Telecommunication, Media and Internet Techno-Economics : 16-18 May 2011.
Author:
Year: 2011 Publisher: New York : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 70 << page
of 7
>>
Sort by