Digital security

Results: 4317



#Item
471Radio / Broadband / Digital Enhanced Cordless Telecommunications / Local loop / Software-defined radio / Burglar alarm / Wireless / Duplex / Walkie-talkie / Technology / Telecommunications engineering / Electronic engineering

Safety, Security and Entertainment The Turnkey Solution for all kind of Ships Safety, Security and Entertainment General

Add to Reading List

Source URL: www.l-3mps.com

Language: English - Date: 2011-07-12 17:02:14
472Digital subscriber line / Electronics / Technology / Wi-Fi / Wireless security / DSL modem / Network switch / Very-high-bit-rate digital subscriber line / Home network / Computer network security / Networking hardware / Computing

SE-2000 MPEG-2 Standard Definiton Encoder

Add to Reading List

Source URL: www.amt.com

Language: English - Date: 2013-01-19 14:37:51
473Biometrics / Information technology management / Digital signature / Electronic signature / Signature / Enterprise content management / Authentication / Cryptography / Security / Notary

LEX_Launch_Content_Highlight_Close_CMYK

Add to Reading List

Source URL: www.perceptivesoftware.co.uk

Language: English - Date: 2015-06-18 15:36:07
474Security / Ambient intelligence / Internet of Things / Computer security / Mobile banking / Smart card / Mobile payment / Digital security / Gemalto / Electronic commerce / Technology / Computer network security

Inside Reinvents Security_FINAL

Add to Reading List

Source URL: www.insidesecure.com

Language: English
475Software / API Management / OAuth / Cloud computing / Windows Vista / Cloud API / Generic Security Services Application Program Interface / Computing / Application programming interfaces / Centralized computing

API Security: A Guide To Securing Your Digital Channels © Akana, All Rights Reserved | Contact Us | Privacy Policy

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2015-03-18 11:23:36
476Computer network security / Cyberwarfare / National security / Information security management system / Information security / IT risk / Cloud computing security / Threat / IT risk management / Computer security / Security / Data security

Intelligent Security: Defending the Digital Business 2 Intelligent Security: Defending the Digital Business

Add to Reading List

Source URL: www.accenture.com

Language: English - Date: 2015-01-22 09:55:39
477Key / Locksmithing / Digital signature / Security / Public-key cryptography / Cryptography / Civil law

DEPARTMENTAL FACULTY/STAFF KEY REQUEST Please submit this form COMPLETED AND SIGNED to: Office of Access Control Services Department of Facilities & Administrative Services

Add to Reading List

Source URL: accesscontrol.pages.tcnj.edu

Language: English - Date: 2011-06-22 11:13:11
478Computer hardware / Software / Android / Nexus One / Samsung Galaxy S / Secure Digital / HTC Desire S / HTC Desire / Universal Serial Bus / Smartphones / Android devices / Computing

Security Analysis of Android Factory Resets Laurent Simon University of Cambridge Ross Anderson

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-05-25 04:32:40
479Notary / Two-factor authentication / Authentication / Digital signature / Cryptography / Security / Civil law

FIDO U2F Raw Message Formats FIDO Alliance Proposed Standard 09 October 2014 This version: http://www.fidoalliance.org/specs/fido­u2f­raw­message­formats­v1.0­ps­html Previous version: http://

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2015-03-30 14:08:30
480Digital media / Computer law / Virtual communities / Fashion / Geek / Stereotypes / Internet / Imaginary / Napster / Computing / Culture / Internet culture

Geeks, Social Imaginaries, and Recursive Publics Christopher Kelty Rice University Openness and scalability, modularity and trust, transparency and security; these

Add to Reading List

Source URL: kelty.org

Language: English - Date: 2014-07-31 13:33:40
UPDATE