Cryptographic software

Results: 2705



#Item
441Cryptographic protocols / Secure communication / Internet standards / Data loss prevention software / Transport Layer Security / Cloud computing / Information privacy / Internet privacy / Data security / Computing / Computer security / Internet

DLP-diagram-simplified-v2-vertical

Add to Reading List

Source URL: www.zscaler.com

Language: English - Date: 2015-04-01 12:38:28
442Password / Default password / Cryptographic software / Password strength / Password cracking / Security / Computer security / Access control

VISA Europe Default & Shared Credentials To simplify deployment, many device manufacturers and software providers supply products which are configured with default username and passwords. Unfortunately, many organisation

Add to Reading List

Source URL: www.visaeurope.com

Language: English - Date: 2015-04-29 08:10:45
443Cryptography / Computing / Secure communication / National security / Computer security / Filesystem-level encryption / Data security / Linoma Software / Encryption / Disk encryption / Security / Cryptographic software

A LINOMA SOFTWARE WHITE PAPER Defending Against Data Breach Developing the Right

Add to Reading List

Source URL: www.cyberdefensemagazine.com

Language: English - Date: 2015-04-28 16:05:41
444Block ciphers / Skipjack / Clipper chip / Cryptographic software / Capstone / Key escrow / Cipher / Public-key cryptography / Key / Cryptography / Key management / National Security Agency

Key Escrow from a Safe Distance Looking Back at the Clipper Chip Matt Blaze University of Pennsylvania

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 2011-11-03 20:44:47
445Windows NT / Windows Vista / Cryptographic software / Windows XP / Windows / BitLocker Drive Encryption / Encrypting File System / Internet Explorer / Windows Server / Microsoft Windows / Software / Computer architecture

ESET_Logo-Gradient-CMYK.eps

Add to Reading List

Source URL: www.welivesecurity.com

Language: English - Date: 2013-12-17 04:45:16
446Access control / Login / Email / Cryptographic software / Computer crimes / LastPass Password Manager / Apple ID / Password / Security / Computing

PDF Document

Add to Reading List

Source URL: www.cices.org

Language: English - Date: 2015-03-02 19:44:02
447Graphics file formats / Steganalysis / Cryptographic software / Jessica Fridrich / JPEG / Bitmap / Grayscale / Cryptography / Espionage / Steganography

IEEE SIGNAL PROCESSING LETTERS, VOL. 12, NO. 6, JUNESteganalysis of LSB Matching in Grayscale Images Andrew D. Ker

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2006-07-16 07:24:38
448Computer security / Login / Cryptographic software / Privileged password management / Security / Access control / Password

WELFORD CHART NOTES NEWSLETTER Volume 39, No. 5 copyright November, 2011

Add to Reading List

Source URL: www.emirj.com

Language: English - Date: 2014-05-08 21:52:57
449Cryptographic software / Economy of Canada / Computing / Mobile software / Sticky Password Manager / Password / BlackBerry / Software

What happens if my iPhone, BlackBerry or Android phone is lost or stolen? In addition to mobile phones, this also applies to Apple iPad and iPod and laptops / netbooks. Protection No Password or Pin set, device not locke

Add to Reading List

Source URL: www.cardiff.ac.uk

Language: English - Date: 2014-07-28 05:51:36
450System administration / Password / Passwd / Su / Filesystem permissions / Group identifier / YaST / Cryptographic software / Home directory / System software / Software / Unix

CHAPTER 19 Managing Users, Managing Security

Add to Reading List

Source URL: cdn.ttgtmedia.com

Language: English - Date: 2007-11-12 08:47:42
UPDATE