BitLocker

Results: 222



#Item
121Windows Server / SIOS Technology Corp. / Windows / Shadow Copy / Microsoft Servers / Hyper-V / Server / BitLocker Drive Encryption / Microsoft Certified Professional / Microsoft Windows / System software / Software

SteelEye Protection Suite for Windows[removed]Release Notes May 2014

Add to Reading List

Source URL: docs.us.sios.com

Language: English - Date: 2014-06-05 11:41:16
122Cryptographic software / Trusted computing / BitLocker Drive Encryption / Windows 7 / Windows Server / Software / Provisioning / Trusted Platform Module / Trusted Computing Group / Computer security / Microsoft Windows / Disk encryption

Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing

Add to Reading List

Source URL: www.fbcinc.com

Language: English - Date: 2014-02-04 12:36:02
123Cryptographic software / FIPS 140-2 / Critical Security Parameter / Key Wrap / FIPS 140 / Key size / BitLocker Drive Encryption / Crypto++ / Cryptography / Cryptography standards / Advanced Encryption Standard

Microsoft Word - 1e - EFJohnson Technologies - Security Policy v5_28.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-10 14:59:55
124System software / Computing / Encryption / BitLocker Drive Encryption / Encrypting File System / Disk encryption / Cryptographic software / Software

WHITE PAPER: HOW ENDPOINT ENCRYPTION WORKS ........................................ How Endpoint Encryption Works Who should read this paper

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2014-11-12 11:43:42
125Computing / Hardware-based full disk encryption / BitLocker Drive Encryption / Encryption / Windows Vista / Backup / Disk encryption hardware / Trusted Storage specification / Disk encryption / Software / Microsoft Windows

FDE Performance Comparison Hardware Versus Software Full Drive Encryption A look at performance and other differences between hardware based self-encrypting drives and software approaches to full disk

Add to Reading List

Source URL: www.security-innovation.org

Language: English - Date: 2010-07-13 00:31:43
126Windows NT / Windows Vista / Cryptographic software / Windows Server / Windows / BitLocker Drive Encryption / Encrypting File System / Internet Explorer / Features new to Windows 7 / Microsoft Windows / Software / Computer architecture

Windows® 8.1 Security New and Improved Windows® 8.1 Security—New and Improved Contents

Add to Reading List

Source URL: static1.esetstatic.com

Language: English - Date: 2014-03-31 10:01:52
127Microsoft Windows / Disk encryption / Cryptography standards / Advanced Encryption Standard / FIPS 140-2 / Encrypting File System / Cryptographic Module Validation Program / BitLocker Drive Encryption / TrueCrypt / Cryptography / Software / Cryptographic software

Information Technology Standards UNM Data Encryption Date Issued: Supersedes: This is a new standard. Responsible Executive: CIO.

Add to Reading List

Source URL: cio.unm.edu

Language: English - Date: 2013-09-25 13:28:34
128Software / System software / ESET NOD32 / ESET / Advanced Encryption Standard / Filesystem-level encryption / Data security / Encrypting File System / BitLocker Drive Encryption / Cryptography / Disk encryption / Cryptographic software

DESlock+ Compliance Guide Protect your data Data is a critical part of every organization, often the most valuable asset; this same information poses a huge risk when it travels or is transmitted outside of the corporat

Add to Reading List

Source URL: static4.esetstatic.com

Language: English - Date: 2014-06-10 13:37:18
129Windows XP / Windows NT / Windows Vista / Windows Server / Windows 7 / BitLocker Drive Encryption / Windows Me / Windows XP editions / Microsoft Windows / Software / Computer architecture

Microsoft Word - Use_the_Win7_Advisor

Add to Reading List

Source URL: groups.haas.berkeley.edu

Language: English - Date: 2010-10-10 03:27:01
130Trusted computing / Key management / Trusted Platform Module / Cryptographic software / Trusted Computing Group / BitLocker Drive Encryption / Key size / Key / Crypt / Cryptography / Computer security / Disk encryption

Tech Digest Figure Template_1.5 column_01-06-12

Add to Reading List

Source URL: techdigest.jhuapl.edu

Language: English - Date: 2013-09-26 17:29:37
UPDATE