Communications security

Results: 3700



#Item
21Auch für IT-Sicherheitskomponenten gilt ab sofort: Miteinander reden Es ist eine kleine Revolution in der IT-Sicherheit: Die Sophos Synchronized Security versetzt Sicherheitskomponenten in die Lage, sich miteinander aus

Auch für IT-Sicherheitskomponenten gilt ab sofort: Miteinander reden Es ist eine kleine Revolution in der IT-Sicherheit: Die Sophos Synchronized Security versetzt Sicherheitskomponenten in die Lage, sich miteinander aus

Add to Reading List

Source URL: www.tc-communications.de

- Date: 2015-11-16 08:31:23
    22Secure Cloud Communications: Overview of Plivo’s Security Architecture and Policies Build your company on a resilient and highly available communications infrastructure  WWW.PLIVO.COM/SECURITY

    Secure Cloud Communications: Overview of Plivo’s Security Architecture and Policies Build your company on a resilient and highly available communications infrastructure WWW.PLIVO.COM/SECURITY

    Add to Reading List

    Source URL: s3.amazonaws.com

    - Date: 2016-06-10 20:26:39
      23Automatische Behebung von Sicherheitsvorfällen in Windeseile: ESG Lab bestätigt hohe Sicherheit und Zeiteinsparung durch Sophos Synchronized Security Enterprise-Level-Security für kleine und mittelständische Unterneh

      Automatische Behebung von Sicherheitsvorfällen in Windeseile: ESG Lab bestätigt hohe Sicherheit und Zeiteinsparung durch Sophos Synchronized Security Enterprise-Level-Security für kleine und mittelständische Unterneh

      Add to Reading List

      Source URL: www.tc-communications.de

      - Date: 2015-11-16 08:31:26
        24Vote Communications Security and Intelligence - Vol 5 Finance and Government Administration Sector - The Estimates of AppropriationsBudget 2016

        Vote Communications Security and Intelligence - Vol 5 Finance and Government Administration Sector - The Estimates of AppropriationsBudget 2016

        Add to Reading List

        Source URL: planetmaori.com

        - Date: 2016-06-08 08:04:09
          25Draft Guidelines for the Protection of Civilians in African Union Peace Support Operations Image: AU Peace and Security Department Communications Officer, Ms Lulit Kebede

          Draft Guidelines for the Protection of Civilians in African Union Peace Support Operations Image: AU Peace and Security Department Communications Officer, Ms Lulit Kebede

          Add to Reading List

          Source URL: www.apsta-africa.org

          - Date: 2016-02-23 04:01:58
            26Taking the Sting Out of the Stingray: The Dangers of Cell-Site Simulator Use and the Role of the Federal Communications Commission in Protecting Privacy & Security Jason Norman*

            Taking the Sting Out of the Stingray: The Dangers of Cell-Site Simulator Use and the Role of the Federal Communications Commission in Protecting Privacy & Security Jason Norman*

            Add to Reading List

            Source URL: www.fclj.org

            Language: English - Date: 2016-01-29 15:34:50
            27Cryptography / E-commerce / Stock market / Key management / Public key infrastructure / Public-key cryptography / Password / Electronic trading / Certificate authority / Futures exchange / Security / Computer security

            Guide to ensure information and communications security In the information society and globalized world of today, people are becoming more and more connected to their computers and the Internet. As a result, electronic t

            Add to Reading List

            Source URL: www.taifex.com.tw

            Language: English - Date: 2012-04-19 04:47:00
            28HTTP - SECURITY http://www.tutorialspoint.com/http/http_security.htm Copyright © tutorialspoint.com  HTTP is used for communications over the internet, so application developers, information

            HTTP - SECURITY http://www.tutorialspoint.com/http/http_security.htm Copyright © tutorialspoint.com HTTP is used for communications over the internet, so application developers, information

            Add to Reading List

            Source URL: www.tutorialspoint.com

            Language: English - Date: 2015-09-30 15:33:47
            29ARTICLE 29 DATA PROTECTION WORKING PARTY  16/EN WP 240  Opinionon the evaluation and review of the

            ARTICLE 29 DATA PROTECTION WORKING PARTY 16/EN WP 240 Opinionon the evaluation and review of the

            Add to Reading List

            Source URL: ec.europa.eu

            Language: English - Date: 2016-07-28 04:40:29
            30An Electronic-signature Based Circular Resolution Database System Thomas Zefferer and Thomas Knall Institute for Applied Information Processing and Communications (IAIK)

            An Electronic-signature Based Circular Resolution Database System Thomas Zefferer and Thomas Knall Institute for Applied Information Processing and Communications (IAIK)

            Add to Reading List

            Source URL: www.a-sit.at

            Language: English - Date: 2010-04-14 10:56:00