Digital security

Results: 4317



#Item
331

THE SECURITY CHALLENGE FOR THE DYNAMIC ENTERPRISE vArmour Distributed Security System: Protecting Assets in the World without Perimeters Re-thinking Security in the Digital World Digital transformation is powering compan

Add to Reading List

Source URL: info.varmour.com

Language: English - Date: 2016-02-07 01:37:07
    332Security / Prevention / E-commerce / Carnegie Mellon University / Computer network security / Computer security / Cryptography / National security / BAE Systems / Computer emergency response team

    e-Skills for Jobs 2015 THE IMPACT OF ICT ON EMPLOYMENT : Education, Jobs and Careers in the Digital Age turning e-Skills into jobs Riga, Latvia, 13 March 2015 Baiba Kaskina, CERT.LV

    Add to Reading List

    Source URL: eskillsforjobs.lv

    Language: English - Date: 2015-03-15 17:08:30
    333Cryptography / Cryptographic hash functions / Hashing / Message authentication codes / Error detection and correction / Secure Hash Algorithm / SHA-2 / Secure Hash Standard / SHA-1 / SHA-3 / Crypt / Digital Signature Algorithm

    FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

    Add to Reading List

    Source URL: nvlpubs.nist.gov

    Language: English - Date: 2015-08-04 11:33:21
    334

    Secrecy, Transparency, Openness, Closedness, Security… : the Tower of Babel of Our Digital Age Mrs Anja Wyden Guelpa

    Add to Reading List

    Source URL: globalforum.items-int.com

    Language: English - Date: 2015-10-07 04:51:12
      335

      INTERNEWS CENTER FOR INNOVATION & LEARNING innovation.internews.org TRAINING DIGITAL SECURITY TRAINERS: A PRELIMINARY REVIEW OF METHODS, NEEDS, AND CHALLENGES

      Add to Reading List

      Source URL: www.theengineroom.org

      Language: English - Date: 2013-12-05 04:02:48
        336

        Digital Security for Activists The Riseup Collective http://zine.riseup.net

        Add to Reading List

        Source URL: zine.riseup.net

        Language: English - Date: 2009-05-17 15:34:59
          337Public-key cryptography / Cryptographic software / Secure communication / E-commerce / Transport Layer Security / OpenSSL / RSA / Blinding / Mbed TLS / Cipher suite / Forward secrecy / Digital signature

          Factoring RSA Keys With TLS Perfect Forward Secrecy Florian Weimer Red Hat Product Security SeptemberAbstract

          Add to Reading List

          Source URL: people.redhat.com

          Language: English - Date: 2015-09-02 09:27:18
          338Technology / Computer network security / Computing / Digital media / Cultural globalization / Internet / New media / Telegraphy / Virtual reality / Firewall / Hotspot / Targeted advertising

          RaGaPa Hotspot Monetization Datasheet The RaGaPa Monetization solution provides an income producing model for businesses offering internet access to their patrons.

          Add to Reading List

          Source URL: s3.amazonaws.com

          Language: English - Date: 2014-09-10 13:35:25
          339

          Threat Protection Address State-of-the-Art Attacks We are at the center of the discussion in the embedded systems security domain. DIGITAL TRUST

          Add to Reading List

          Source URL: secure-ic.com

          Language: English - Date: 2013-09-09 01:11:14
            340

            Journals Call for Papers IET Information Security OPEN PUBLI ACCESS

            Add to Reading List

            Source URL: digital-library.theiet.org

            Language: English - Date: 2014-11-05 10:52:20
              UPDATE