Digital security

Results: 4317



#Item
111Software / Computing / Digital media / Social media / Social networking services / Cybercrime / Social networks / Universal Windows Platform apps / Social engineering / Internet privacy / Computer security / Facebook

North Carolina Office of the Governor North Carolina Office of Information Technology Services North Carolina Department of Cultural Resources Best Practices for State Agency Social Media Usage in North Carolina Version

Add to Reading List

Source URL: digitalpreservation.ncdcr.gov

Language: English - Date: 2016-05-02 15:16:04
112Network video recorder / Video hardware / NVR / Digital media / IP camera / Double-click / Digital video recorder / Imaging / Video

NVR Manual Welcome to use our network video recorder. For your secure using, please read this user manual carefully. The following contents are about the proper use of the product, the prevention of danger and loss of pr

Add to Reading List

Source URL: www.lowcost-security.ch

Language: English - Date: 2015-04-20 07:28:40
113Cryptography / Public-key cryptography / Secret sharing / Key management / Digital signature / Signature / Digital Signature Algorithm / Commitment scheme / Threshold cryptosystem / Semantic security / RSA / Bitcoin

Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro1 , Steven Goldfeder2 , and Arvind Narayanan2 1 City College, City University of New York

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-01-26 19:57:17
114Technology / Computing / Media technology / Digital media / Geert Lovink / XS4ALL / Internet / E-democracy / Bulletin board system / Computer network / Security hacker / DirectDraw Surface

The Rise and Fall of DDS evaluating the ambitions of AmsterdamÕs Digital City

Add to Reading List

Source URL: reinder.rustema.nl

Language: English - Date: 2011-04-20 17:16:48
115Computer access control / Computer security / Access control / Multi-factor authentication / One-time password / Security token / Authentication / Mobile security / Password / Electronic authentication / Extensible Authentication Protocol

Mobile multifactor security A revolution in authentication and digital signing Mobile multifactor security

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:48:03
116Security / Computer security / Cyberwarfare / Computer network security / Cybercrime / National security / Threat

www.pwc.ch/digitaltrustge2016 Invitation Digital Trust Conference 2016

Add to Reading List

Source URL: old.pwc.ch

Language: English
117Cryptography / Internet / Computing / Internet protocols / Internet Standards / Domain name system / Key management / Public-key cryptography / Domain Name System Security Extensions / Digital signature / Zone file

.ca Signing Metrics R. Gieben∗ NLnet Labs May 2, 2006 NLnet Labs document

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:10
118Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Hong Kong / Information security / Computer security

Dear OGCIO, I am very encouraged after reading the consultation paper on 2014 Digital 21 Strategy. The paper gives the impression Hong Kong will leverage its ICT achievements, huge pool of young, enthusiastic and innova

Add to Reading List

Source URL: www.digital21.gov.hk

Language: English - Date: 2014-01-20 06:40:06
119Cryptography / Message authentication codes / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Digital Signature Algorithm / FIPS 140-2 / Dual EC DRBG / OpenSSL / SHA-2 / Hash-based message authentication code

FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-05-26 13:27:36
120Computing / Information technology / Data management / Data / Business intelligence / Big data / Computer security / Formal sciences / Threat / Analytics / Data warehouse

Solutions Threat Intelligence Vanquish Digital Threats: Internal

Add to Reading List

Source URL: www.koverse.com

Language: English - Date: 2015-09-29 12:19:29
UPDATE