and Security Technologies

Results: 1110



#Item
441Credit cards / Business / Computer law / Money / Economics / Payment Card Industry Data Security Standard / Payment card industry / Malware / EMV / Payment systems / Data privacy / Electronic commerce

DEFENDING AGAINST POS RAM SCRAPERS Current and Next-Generation Technologies

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2015-03-09 22:00:24
442Wireless Transport Layer Security / WAP gateway / Wireless Session Protocol / Kannel / WinWAP / Open Mobile Alliance / Push Proxy Gateway / Wireless Application Protocol / Technology / Software / Computing

Winwap Technologies Oy Client WAP Stack Library WAP Gateway Compatibility and Interoperability Charts WAP stack version 2.6 WAP specification version: 2.0

Add to Reading List

Source URL: www.winwap.com

Language: English - Date: 2008-08-26 11:01:05
443Computer security / InterTrust Technologies / Ripping / OMA DRM / PlayReady / Digital rights management / Copyright law / Cryptography

12th Conference on Computers, Freedom & Privacy San Francisco, April 16th-19th 2002 Fair Use by Design Session 3: What DRM can and cannot do….and what it is or isn’t doing today Nic Garnett & Tomas Sander1

Add to Reading List

Source URL: www.cfp2002.org

Language: English - Date: 2002-04-15 14:57:51
444Hadoop / MapR / Apache Hadoop / Cisco Systems / Cisco Unified Computing System / Fabric computing / Cisco Catalyst / Cloud computing / Computing / Cloud infrastructure

Customer Case Study Solutionary Boosts Security with Cisco and MapR Technologies Executive Summary

Add to Reading List

Source URL: www.cisco.com

Language: English
445Internet / Denial-of-service attack / LOIC / Prolexic Technologies / Botnet / Transmission Control Protocol / Network Time Protocol / SYN flood / NTP server misuse and abuse / Denial-of-service attacks / Computer network security / Computing

THREATS AND MITIGATIONS A GUIDE TO MULTI-LAYERED WEB SECURITY

Add to Reading List

Source URL: it.akamai.com

Language: English - Date: 2014-09-16 06:08:01
446Interoperability / Telecommunications / Certified first responder

First Responder Technologies (R-Tech) Tech Clearinghouse TechSolutions Greg Price Science and Technology Directorate Department of Homeland Security

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2007-12-07 15:28:14
447Distributed computing / SoftLayer / Data center / Server / Provisioning / Dedicated hosting service / Web hosting / Computing / Concurrent computing

SOFTLAYER TECHNOLOGIES, INC. SOC 3 SYSTRUST FOR SERVICE ORGANIZATIONS REPORT SYSTEM DESCRIPTION OF THE PLATFORM SERVICES RELEVANT TO SECURITY AND AVAILABILITY TABLE OF CONTENTS

Add to Reading List

Source URL: cdn.softlayer.com

Language: English - Date: 2015-02-13 16:26:49
448Computing / Content delivery network / Akamai Technologies / Internet

AKAMAI FACT SHEET Akamai for Media & Entertainment Speed, Reliability, Security. The world’s leading media and entertainment organizations leverage the Akamai Intelligent Platform

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2014-08-20 04:40:02
449Emerging technologies / Security / Safety engineering / Nanotechnology / Industrial hygiene / Safe Work Australia / Workplace safety / Impact of nanotechnology / Minister for Tertiary Education /  Skills /  Jobs and Workplace Relations / Safety / Occupational safety and health / Risk

SAFE WORK AUSTRALIAN ISSUE 8 July 2012

Add to Reading List

Source URL: pandora.nla.gov.au

Language: English - Date: 2013-07-08 18:29:03
450Computer network security / Science / Statistics / Data analysis / Data mining / Analysis / Threat / Mass spectrometry software / Anomaly detection / Computer security / Data security / Security

2 Technologies for Security of the 2 Internet 2-1 A Study on Process Model for Internet Risk Analysis NAKAO Koji, MARUYAMA Yuko, OHKOUCHI Kazuya, MATSUMOTO Fumiko, and MORIYAMA Eimatsu

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:55:14
UPDATE