Disk encryption

Results: 830



#Item
761Computer security / Encryption / Computer hardware / Data security / USB flash drive / Hardware-based full disk encryption / Data loss prevention software / Laptop / USB flash drive security / Disk encryption / Computing / McAfee

Business Brief Ironclad Security for Lost Devices Confidently protect valuable data while managing security Ironclad Encryption with McAfee

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:03:48
762Computer architecture / Computer hardware / Disk encryption / Intel / AES instruction set / Encryption / Data security / McAfee VirusScan / DiskCryptor / McAfee / Computing / Intel vPro

Intel_McAfee_Security_horiz_4c

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-30 18:01:29
763Trusted computing / Disk encryption / Kernel / Trusted Execution Technology / Virtual machine / Ring / Trusted Platform Module / Operating system / Loadable kernel module / Software / Computing / Computer security

SECURITY & PRIVACY Rapid Trust Establishment for Pervasive Personal Computing

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2007-10-30 08:22:15
764Cryptographic hash function / Authenticated encryption / RSA / Advanced Encryption Standard / Disk encryption theory / Cryptography / Block cipher / Entropy

Space-Efficient Block Storage Integrity Alina Oprea∗

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-02-06 21:17:41
765Block cipher modes of operation / Watermarking attack / Block cipher / Ciphertext / RSA / Advanced Encryption Standard / Probabilistic encryption / Disk encryption theory / Cryptography / Disk encryption / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2009

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-03-10 01:08:56
766Encryption / RSA / Disk encryption / Disk encryption theory / Four-square cipher / Cryptography / Cryptographic software / Encryption software

PDF Document

Add to Reading List

Source URL: www.kavit.com

Language: English - Date: 2012-04-05 13:55:45
767Block cipher / Encryption / Crypt / Triple DES / Index of cryptography articles / Disk encryption theory / Cryptography / Secret sharing / Cipher

IntelliSec L. Csirmaz: RSS and Secure Information Storage Ramp secret sharing and

Add to Reading List

Source URL: www.renyi.hu

Language: English - Date: 2009-11-11 13:43:53
768Relational database management systems / Disk encryption / Transparent Data Encryption / Cryptographic software / Oracle Database / Relational database / SQL / Database index / Cipher / Cryptography / Data management / Computing

Implementing Data-at-Rest Encryption within the Oracle RDBMS James Forgy RDC Software, November 2009 www.relationalwizards.com Abstract:

Add to Reading List

Source URL: www.relationalwizards.com

Language: English - Date: 2013-01-23 23:49:39
769Disk encryption / Password / Cryptographic software / Cryptography

Spotlight on Security Security Determine a range of dates and the hours and days for which staff and/or volunteers can access applications and data. Determine nine levels of access for each user – from view and print

Add to Reading List

Source URL: www.rdsadvantage.com

Language: English - Date: 2011-03-23 16:06:53
770Windows Vista / Windows Server / Windows 7 / Cryptographic software / BitLocker Drive Encryption / Disk encryption / Windows PowerShell / Windows Firewall / Shell / Microsoft Windows / Computing / Software

Managing and Maintaining Windows[removed]

Add to Reading List

Source URL: www.c-trec.net

Language: English - Date: 2014-03-26 08:46:57
UPDATE