Disk encryption

Results: 830



#Item
391Disk encryption / Trusted Platform Module / Trusted Execution Technology / Windows Vista / Direct Anonymous Attestation / BitLocker Drive Encryption / Computer security / Trusted computing / Cryptography

Falsification Prevention and Protection Technologies and Products NEC’s Attitude to “Trusted Computing” By Takahisa SHIRAKAWA* NEC attaches great importance to security for its business PCs (The brand names of NE

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:29:13
392Cryptographic software / Linux kernel / Application programming interfaces / Unix / Disk encryption / Cryptoloop / Device mapper / Encrypting File System / Loop device / Software / System software / Computer architecture

Cryptoloop HOWTO Ralf Hölzer 2004−01−15 Revision History

Add to Reading List

Source URL: www.tldp.org

Language: English - Date: 2008-12-14 11:52:46
393Computer security / Computing / Computer architecture / NonStop / Security / Encryption / HP StorageWorks / Backup / HP Data Protector / Disk encryption / Cryptography / Cryptographic software

HP NonStop Volume Level Encryption Data sheet More than 20,000 security standards have emerged worldwide and nearly all include requirements to protect data-at-rest from exposure by theft or media

Add to Reading List

Source URL: h20195.www2.hp.com

Language: English
394Cryptography / Cross-platform software / Disk encryption / Computer security / Smart card / GNU Privacy Guard / Data security / TrueCrypt / Access control / Software / Cryptographic software / Computing

escrypt GmbH System Provider for Embedded Security A Generic Architecture and Extension of eCryptfs:

Add to Reading List

Source URL: www.linux-kongress.org

Language: English - Date: 2009-10-30 06:39:24
395Portable media players / USB / Electronics / Computing / Disk encryption / USB flash drive / SanDisk / Computer hardware

USB Media Compatibility List for ScanNCut series Page 1/2 This document provides the information about the compatibility of USB media for the ScanNCut series products. Type of USB

Add to Reading List

Source URL: download.brother.com

Language: English - Date: 2014-03-07 00:42:22
396Trusted computing / Disk encryption / Trusted Platform Module / Hewlett-Packard / Cold boot attack / Public-key cryptography / Virtualization / Performance measurement / Cryptography / Computer security / Computing

The CloudProxy Tao for Trusted Computing John Manferdelli Tom Roeder Fred Schneider

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-10 19:44:59
397Cryptography / Cryptographic software / Computer security / Encryption / Information security / Public safety / National security / Network Security & Cryptography / Disk encryption / Security / Data security

UTS 165 Revision May, 2008 Number: Security Practice Bulletin #1 (SPB-1)

Add to Reading List

Source URL: www.utsystem.edu

Language: English - Date: 2014-06-10 13:09:19
398Intel vPro / Computer hardware / Disk encryption / Intel Active Management Technology / AES instruction set / McAfee / Intel / Wake-on-LAN / Advanced Encryption Standard / Computing / Out-of-band management / Cryptography

Intel_McAfee_Security_horiz_4c

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-31 20:04:17
399Trusted computing / X86 architecture / Cloud infrastructure / Disk encryption / AES instruction set / Trusted Execution Technology / OpenStack / Intel / Hypervisor / System software / Software / Computing

Open Source on Intel white paper OpenStack* Intel® Xeon® processors

Add to Reading List

Source URL: software.intel.com

Language: English - Date: 2013-12-05 13:47:51
400

Sophos SafeGuard Disk Encryption for Mac Startup-Anleitung

Add to Reading List

Source URL: www.sophos.com

Language: German - Date: 2012-05-13 11:48:52
    UPDATE