Browser security

Results: 417



#Item
181Software / Internet privacy / Network architecture / Mobile computers / BlackBerry / Virtual private network / Mobile document access / Microsoft Forefront Threat Management Gateway / Vision Mobile Browser / Computing / Computer network security / Technology

Microsoft Word - PocketVPN Security White Paper.doc

Add to Reading List

Source URL: www.xe2.co.uk

Language: English - Date: 2013-12-19 15:21:12
182Public key certificate / CA/Browser Forum / Certificate authority / Extended Validation Certificate / X.509 / Transport Layer Security / Revocation list / Certificate policy / European Telecommunications Standards Institute / Cryptography / Key management / Public-key cryptography

TR[removed]V1[removed]Electronic Signatures and Infrastructures (ESI); Guidance for Auditors and CSPs on ETSI TS[removed]for Issuing Publicly-Trusted TLS/SSL Certificates

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2012-11-16 08:29:02
183Computer security / Antivirus software / ZoneAlarm / Malware / Spyware / Social engineering / Check Point / Phishing / System software / Software / Computer network security

STARTER GUIDE Virtualized Browser Security Surf Safely & Privately The Internet. It is one bad neighborhood. But ZoneAlarm® ForceField™ has got your back.

Add to Reading List

Source URL: download.zonealarm.com

Language: English - Date: 2008-03-12 19:20:05
184Security / Computer security / Comodo Group / Extended Validation Certificate / Certificate authority / Root certificate / Public key certificate / Comodo / CA/Browser Forum / Key management / Public-key cryptography / Cyberwarfare

Microsoft Word - Comodo SSL Certificate Subscriber Agreement - ink[removed]doc

Add to Reading List

Source URL: info.ssl.com

Language: English - Date: 2015-03-04 18:25:13
185Certificate policy / Extended Validation Certificate / Public key certificate / X.509 / Certificate authority / Revocation list / CA/Browser Forum / Transport Layer Security / Online Certificate Status Protocol / Cryptography / Public-key cryptography / Key management

E-Tuğra Certification Practice Statement - Version 3.0

Add to Reading List

Source URL: www.e-tugra.com.tr

Language: English - Date: 2013-09-11 03:13:23
186Security token / Single sign-on / One-time password / Password / QR code / Authentication / Keystroke logging / Two-factor authentication / Password manager / Security / Computer security / Access control

Strong authentication via QR Code With Evidian QRentry™, your users authenticate with a QR Code™ and their smartphone. The QRentry™ solution allows authenticating with a browser on a web portal or on Windows from

Add to Reading List

Source URL: www.evidian.com

Language: English - Date: 2015-03-09 12:43:08
187Internet / HTTP / HTTP cookie / Privacy mode / P3P / Privacy / Web browser / Usability / Internet privacy / Ethics / Computing

Bridging the Gap between People and Policies in Security and Privacy by Umesh Shankar A.B. (Harvard University[removed]M.S. (University of California, Berkeley) 2002

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
188Technology / Online chat / Good Technology / Mobile software / IBM Lotus Domino / Microsoft Exchange Server / Instant messaging / Provisioning / Vision Mobile Browser / Computing / Software / Groupware

COMPANY CONFIDENTIAL SECURITY TARGET FOR GOOD FOR ENTERPRISE SYSTEM, V1.19

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-09-19 06:43:37
189Secure communication / Cryptographic protocols / Electronic commerce / Transport Layer Security / HTTP Secure / Public key certificate / Certificate authority / X.509 / GnuTLS / Cryptography / Public-key cryptography / Key management

The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software Martin Georgiev Subodh Iyengar

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2012-10-13 15:43:00
190Workflow technology / Security / Password / User provisioning software / Web Access Management / IBM Lotus Notes / Workflow application / Workflow / BoKS / System software / Software / Identity management

COSuser web browser workflow User Interface COSuser web browser workflow User Interface User provisioning software such as COSuser provides a quick Return on Investment ("RoI") when implemented correctly. Of all the eff

Add to Reading List

Source URL: www.cosuser.com

Language: English - Date: 2011-03-31 09:55:00
UPDATE