Deep-secure

Results: 79



#Item
61Computer security / Computing / Corey Schou / Security / (ISC)² / Certified Information Systems Security Professional

Empowering Everyone to Secure Their Online Life The (ISC)2® Foundation was born through the deep conviction of (ISC)2’s almost 100,000 members who believe that: • Research is a powerful tool that helps forecast new

Add to Reading List

Source URL: www.isc2cares.org

Language: English - Date: 2014-04-15 15:10:01
62Computer network security / Mass surveillance / Hacking / Cyberwarfare / Computer security / Secure communication / National Security Agency / Central Intelligence Agency / NSA warrantless surveillance controversy / National security / Security / Software

Cornering the Zero-Day Market The Schizophrenia of the Deep State By Bill Blunden, August 7, 2014 A few days ago Dan Geer, the chief information security officer at In-Q-Tel, gave a keynote address at Black Hat USA1. Acc

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-08-09 06:14:10
63Diver training / Recreational diving / Diving safety officer / American Academy of Underwater Sciences / Diver rescue / Scuba diving / Decompression / Deep diving / Diving equipment / Underwater diving / Underwater sports / Water

2013 AAUS Standards Revisions Summary October, 2013 Overview Since 2011, AAUS has been working with International Training (ITI) and Willis Insurance to provide a mechanism for AAUS to develop a recognized AAUS Certifica

Add to Reading List

Source URL: secure.aaus.org

Language: English
64Cisco Systems / Deep packet inspection / Videotelephony / Computer networking / Cisco Unified Computing System / NX-OS / Cisco Nexus switches / Cisco Catalyst / Virtual LAN / Computing / Concurrent computing / Cloud computing

Service Provider Builds Secure Private Cloud for Banking

Add to Reading List

Source URL: www.cisco.com

Language: English
65Routers / Cisco Systems / Deep packet inspection / Videotelephony / Cisco IOS / Network security / Secure Shell / Telnet / Computing / System software / Network architecture

13CS4168_CiscoLive_PPT_Temp_photo_R2

Add to Reading List

Source URL: www.dhses.ny.gov

Language: English - Date: 2014-06-09 07:58:25
66Cisco Systems / Deep packet inspection / Cisco IOS / Pidgin / Computer network / Software / Videotelephony / Cross-platform software

AIRS™ The AvFinity Integrated Router Solution™ A Secure, Multi-protocol, Data Manipulation Solution PRODUCT OVERVIEW AIRS combines all the strengths of

Add to Reading List

Source URL: www.avfinity.com

Language: English - Date: 2012-06-08 10:42:09
67National security / United States Department of Homeland Security / Law enforcement in the United States / Secure Communities and administrative immigration policies / U.S. Immigration and Customs Enforcement / Immigration detention / Racial profiling / Illegal immigration to the United States / Law enforcement / Law

September 1, 2010 Dear Governor David Paterson: As members of the New York State Senate, we are writing to express our deep concern about the Secure Communities (S-Comm) program. We also write in support of the request

Add to Reading List

Source URL: www.nysenate.gov

Language: English - Date: 2011-06-01 16:47:12
68Initialization vector / Probabilistic encryption / Ciphertext indistinguishability / Deterministic encryption / RSA / Disk encryption theory / Block cipher / Cipher / MapReduce / Cryptography / Homomorphic encryption / Paillier cryptosystem

MrCrypt: Static Analysis for Secure Cloud Computations Sai Deep Tetali Mohsen Lesani Rupak Majumdar

Add to Reading List

Source URL: www.cs.ucla.edu

Language: English - Date: 2013-07-29 19:36:50
69European Data Protection Supervisor / Internet / Computing / Computer law / Internet access / Child pornography / Internet privacy / Deep packet inspection

Microsoft Word[removed]28_LIBE_speech_GB_EN

Add to Reading List

Source URL: secure.edps.europa.eu

Language: English - Date: 2010-10-01 05:07:47
70Industrial automation / Automation / Data security / EtherNet/IP / Firewall / Common Industrial Protocol / Deep packet inspection / Security appliance / SCADA / Technology / Computer network security / Industrial Ethernet

Belden Assists Schneider Electric to Secure Critical Industrial Automation Systems New ConneXium Tofino Firewall Protects EtherNet/IP Communications St. Louis, Missouri – January 28, 2014 – Belden Inc. (NYSE: BDC), a

Add to Reading List

Source URL: www.modbus.com

Language: English - Date: 2014-02-05 15:48:08
UPDATE