Cryptography

Results: 21893



#Item
601Cryptography / Public key infrastructure / Key management / Public-key cryptography / Transport Layer Security / E-commerce / GlobalSign / Extended Validation Certificate / Certificate authority / Certificate policy / Certification Practice Statement / CA/Browser Forum

GlobalSign CA Certification Practice Statement Date: 2nd May 2016 Version: v8.1

Add to Reading List

Source URL: jp.globalsign.com

Language: English - Date: 2016-05-26 21:37:36
602Cryptography / Microsoft / WABA / Email / WBW / Breastfeeding / Outlook.com / Public key certificate

Report Format: Application for WBW 2016 E-Certificate

Add to Reading List

Source URL: worldbreastfeedingweek.org

Language: English - Date: 2016-07-15 03:25:28
603Cryptography / Security / Prevention / E-commerce / Crime prevention / Information governance / National security / Computer security / Certificate authority / Public key certificate / Information security / Password

PEXA Subscriber Security Policy Increment 3 PEXA System Security Policy VersionNovember 2014

Add to Reading List

Source URL: www.pexa.com.au

Language: English - Date: 2016-07-20 01:39:45
604Security / Prevention / Computer security / Access control / Data security / Cryptography / National security / Health Insurance Portability and Accountability Act / Medical privacy / Electronic health record / Vulnerability / Information technology audit

HIPAA Security Series #4 - Technical Safeguards

Add to Reading List

Source URL: www.hhs.gov

Language: English - Date: 2015-09-03 14:19:54
605Theoretical computer science / Quantum mechanics / Quantum computing / Quantum information science / Computational complexity theory / Quantum cryptography / Quantum algorithm / Qubit / Continuous-time quantum walk / Quantum annealing

Classical and Quantum Algorithms for Finding Cycles Jill Cirasella Computational Sciences Specialist Brooklyn College Library

Add to Reading List

Source URL: jillcirasella.commons.gc.cuny.edu

Language: English - Date: 2014-05-02 15:14:51
606Security / Prevention / Safety / National security / Computer security / Crime prevention / Cryptography / Information governance / Information security / Continuous auditing / IT risk

Microsoft Word - Information Resource Activity Review Policy.docx

Add to Reading List

Source URL: it.ouhsc.edu

Language: English - Date: 2014-12-11 11:30:27
607Cryptography / E-commerce / Key management / Public key certificate / Public key infrastructure / Public-key cryptography / Professional certification

DSWD-RLA Form 11 ASSESSMENT TOOL FOR REGISTRATION AND LICENSING OF SWDAs Type of Application : (Please check the appropriate box)  Registration

Add to Reading List

Source URL: www.dswd.gov.ph

Language: English - Date: 2016-05-04 08:14:22
608INESC-ID / University of Trs-os-Montes and Alto Douro / Advanced Encryption Standard / Cryptography / Academia

Microsoft PowerPoint - adcom09_final

Add to Reading List

Source URL: sips.inesc-id.pt

Language: English - Date: 2009-12-19 13:13:20
609Security / Prevention / Computer security / Crime prevention / Cryptography / Information governance / National security / Information security / FIPS 140-2 / Consultant / Professional certification / Common Criteria

Introducing atsec information security Chief Executive Officer, Director of Strategy and Business Devlopment Who are we?

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 08:15:52
610Computing / Computer access control / Computer security / Cryptography / Cryptographic protocols / Hypertext Transfer Protocol / Secure communication / Internet protocols / Transport Layer Security / Digest access authentication / Basic access authentication / Form-based authentication

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D1.1

Add to Reading List

Source URL: websand.eu

Language: English - Date: 2015-05-06 05:08:48
UPDATE