Disk encryption

Results: 830



#Item
441Computer hardware / Disk encryption / Computer networking / Wi-Fi / Bluetooth / Wireless / USB flash drive / Universal Serial Bus / Malware / Computing / Technology / Mobile computers

The Risks of Using Portable Devices Pennie Walters Portable devices like jump drives, personal audio players, and tablets give users convenient access to business and personal data on the go. As their use increases, howe

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2013-04-15 13:11:52
442Cryptographic software / Trusted computing / BitLocker Drive Encryption / Windows 7 / Windows Server / Software / Provisioning / Trusted Platform Module / Trusted Computing Group / Computer security / Microsoft Windows / Disk encryption

Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing

Add to Reading List

Source URL: www.fbcinc.com

Language: English - Date: 2014-02-04 12:36:02
443In re Boucher / Law / Fifth Amendment to the United States Constitution / Encryption / Subpoena duces tecum / Plaintext / Cryptographic software / Key disclosure law / Pretty Good Privacy / Disk encryption / Cryptography / Digital forensics

Forced Data Decryption: Does It Violate the Fifth Amendment?

Add to Reading List

Source URL: www.crowell.com

Language: English - Date: 2013-02-15 15:21:03
444Zeroisation / Cryptographic Module Validation Program / Advanced Encryption Standard / Disk encryption / Cryptography / Cryptography standards / FIPS 140

TID[removed]5CM2-Kanguru_So[removed]V1_140sp

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-11-13 06:50:18
445

CSfC Selections for Software Full Disk Encryption Software Full Disk Encryption products used in CSfC solutions shall be validated by NIAP/CCEVS or CCRA partnering schemes as complying with the current requirements of NI

Add to Reading List

Source URL: www.nsa.gov

- Date: 2014-08-07 13:15:22
    446Privileged communication / Eminent domain / Fifth Amendment to the United States Constitution / Subpoena duces tecum / Self-incrimination / TrueCrypt / Privilege / Title 18 of the United States Code / In re Boucher / Law / Software / Disk encryption

    [PUBLISH] IN THE UNITED STATES COURT OF APPEALS FOR THE ELEVENTH CIRCUIT ________________________ Nos[removed] &[removed]

    Add to Reading List

    Source URL: www.uscourts.gov

    Language: English - Date: 2012-02-24 11:15:45
    447Clipper chip / Key escrow / Strong cryptography / Key size / Data Encryption Standard / Encryption / Key / Export of cryptography in the United States / Disk encryption / Cryptography / Key management / 56-bit encryption

    Encryption Policy Issues Jon M. Peha1 October 1998 Section 1: Introduction Controlling the flow of information in the information age is as important as controlling the

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 1998-10-25 07:50:27
    448Special purpose file systems / Disk encryption / Public-key cryptography / Key management / Filesystem-level encryption / NTFS / Key size / Folder / Computer file / Cryptography / Microsoft Windows / Cryptographic software

    Cryptree: A Folder Tree Structure for Cryptographic File Systems Dominik Grolimund, Luzius Meisser, Stefan Schmid, Roger Wattenhofer {grolimund@inf., meisserl@, [removed]., [removed].}ethz.ch Computer Engi

    Add to Reading List

    Source URL: dcg.ethz.ch

    Language: English - Date: 2014-09-26 08:36:29
    449Computing / Cryptography / Disk encryption / Hardware-based full disk encryption / Trusted Computing Group / FIPS 140-2 / FIPS 140 / Parallel ATA / Trusted Computing / Computer hardware / Cryptography standards / Computer security

    Microsoft Word - 9f - Seagate SecureĀ® TCG Opal SSC SED FIPS[removed]Module Security Policy rev 1.4.docx

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2014-12-08 10:58:40
    450Computer security / Lightweight Portable Security / Crypt / Passphrase / Zip / Encryption / Encrypting File System / Filesystem-level encryption / Cryptographic software / Disk encryption / Cryptography

    INFORMATION SERVICES MANAGEMENT CENTER (UIS)

    Add to Reading List

    Source URL: www.usuhs.mil

    Language: English - Date: 2014-11-17 14:34:36
    UPDATE