Disk encryption software

Results: 525



#Item
471Software / Encryption software / Encryption / Ciphertext / Data security / Advanced Encryption Standard / BitLocker Drive Encryption / Cryptography / Cryptographic software / Disk encryption

Security and Snake Oil: Choosing the right encryption software One of the best solutions to the need to protect sensitive information is through data encryption.

Add to Reading List

Source URL: www.winencrypt.com

Language: English - Date: 2009-01-08 06:10:11
472Disk encryption / Cryptographic software / Windows Vista / BitLocker Drive Encryption / Windows Server / Trusted Platform Module / Trusted Computing Group / NTFS / USB flash drive / Microsoft Windows / Cryptography / Computer security

Bitlocker and Windows Vista This is an INCOMPLETE draft version. Visit www.nvlabs.in for updates. Nitin Kumar

Add to Reading List

Source URL: www.nvlabs.in

Language: English - Date: 2013-11-13 03:35:04
473Cryptographic software / Software / Windows Vista / Windows Server / BitLocker Drive Encryption / Windows 7 / Trusted Platform Module / Cold boot attack / Microsoft Windows / Cryptography / Disk encryption

Analysis of Window Vista Bitlocker Drive Encryption This is an INCOMPLETE draft version. Visit www.nvlabs.in for updates

Add to Reading List

Source URL: www.nvlabs.in

Language: English - Date: 2013-11-13 03:34:25
474Cryptographic software / Windows Vista / BitLocker Drive Encryption / Windows 7 / Windows Server / Chosen-plaintext attack / Ciphertext / Advanced Encryption Standard / Cryptography / Disk encryption / Microsoft Windows

Bitlocker: A little about the internals and what changed in Windows 8 Dan Rosendorf S.ICZ Na hˇrebenech II[removed]Praha 4

Add to Reading List

Source URL: spi.unob.cz

Language: English - Date: 2013-05-23 04:28:04
475System software / Computing / TrueCrypt / On-the-fly encryption / NTFS / Filesystem in Userspace / USB flash drive / File system / Deniable encryption / Software / Cryptographic software / Disk encryption

TRUECRYPT FREE OPEN-SOURCE ON-THE-FLY ENCRYPTION USER’S GUIDE Version Information TrueCrypt User’s Guide, version 3.1a. Released February 7, 2005.

Add to Reading List

Source URL: docs.huihoo.com

Language: English - Date: 2008-12-05 04:23:51
476Disk encryption / Special purpose file systems / Encrypting File System / Pretty Good Privacy / Cipher / Encryption software / Email encryption / Symmetric-key algorithm / Filesystem-level encryption / Cryptography / Cryptographic software / Public-key cryptography

DOC Document

Add to Reading List

Source URL: www.netaction.org

Language: English - Date: 2007-08-27 11:25:52
477Disk encryption / Microsoft Windows / Encryption software / Windows Vista / Encryption / Windows Explorer / Security and safety features new to Windows Vista / Cryptographic software / System software / Software

Microsoft Word - GoldKey PIV Manual-7.12.docx

Add to Reading List

Source URL: www.goldkey.com

Language: English - Date: 2014-06-16 11:28:10
478Key management / Cryptography / Cryptographic software / Special purpose file systems / Computer security / Cloud infrastructure / Vormetric / Transparent Data Encryption / Disk encryption / Computing / Cloud computing

Porticor Virtual Private Data Safeguarding Data in the Cloud Porticor® Virtual Private Data™ (VPD™) combines state of the art data encryption with patented homomorphic split-key management to offer the most secure,

Add to Reading List

Source URL: www.porticor.com

Language: English - Date: 2013-07-04 08:48:08
479Computing / Electronic commerce / Cryptographic software / USB / Password / USB flash drive / TrueCrypt / Computer security / Antivirus software / Software / Disk encryption / Security

IT Security Practices While Departmental and Campus IT units are accountable for the security of computer networks; computer and data security is also each individual’s responsibility. In addition, researchers are ofte

Add to Reading List

Source URL: tigger.uic.edu

Language: English - Date: 2010-05-24 17:28:35
480Trusted computing / Cryptography / Disk encryption / Trusted Computing Group / Trusted Platform Module / BitLocker Drive Encryption / Trusted computing base / Computer security / Microsoft Windows / Security

Modeling TCG-based Secure Systems with Colored Petri Nets? Liang Gu† , Yao Guo†?? , Yanjiang Yang § , Feng Bao§ , Hong Mei† † Key Laboratory of High Confidence Software Technologies (Ministry of Education),

Add to Reading List

Source URL: sei.pku.edu.cn

Language: English - Date: 2010-11-12 00:51:14
UPDATE