Encryption software

Results: 1087



#Item
681FIPS 140-2 / HMAC / Advanced Encryption Standard / Encrypting File System / IEEE P1619 / Cryptography / Cryptographic software / Cryptography standards

FIPS[removed]Security Policy for Motorola, Inc. The Motorola EMS Cryptographic Library Firmware Module Firmware Component Version:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-11-17 16:21:00
682System administration / Software / Microsoft Management Console / Computing / Sophos / System software / Disk encryption

Sophos Enterprise Console upgrade guide Product version: 5.2.2 Document date: September 2014

Add to Reading List

Source URL: www.sophos.com

Language: English - Date: 2014-09-17 11:10:55
683Computing / Disk encryption / Windows Vista / Security token / Cryptographic software / Pre-boot authentication / FIPS 140 / Smart card / Password / Cryptography / Computer security / Cryptography standards

Microsoft Word - Security Policy 30_Nov_08.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-12-16 00:00:00
684Internet protocols / Internet standards / Secure communication / Transport Layer Security / FIPS 140-2 / FIPS 140 / Advanced Encryption Standard / Zeroisation / Hardware security module / Cryptography / Cryptography standards / Cryptographic software

SUSK Security Module (Software Version: 1.1) FIPS[removed]Non-Proprietary Security Policy Level 1 Validation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-12-15 00:00:00
685FIPS 140 / NSA Suite B Cryptography / HMAC / Elliptic curve cryptography / Advanced Encryption Standard / Key generation / Microsoft CryptoAPI / Crypto++ / Cryptography / Cryptography standards / Cryptographic software

Microsoft Word - C3m_software_SP.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-11-29 10:31:00
686Cryptography / Hypervisor / Hyper-V / Cloud computing / Encryption / Cloud infrastructure / Virtual machines / Vormetric / IBM cloud computing / System software / Software / Computing

PDF Document

Add to Reading List

Source URL: hytrust.com

Language: English - Date: 2014-07-22 13:31:54
687System software / Computing / FileVault / TrueCrypt / Personally identifiable information / Password / Encryption software / Encrypting File System / BitLocker Drive Encryption / Cryptographic software / Disk encryption / Software

Data Handling Best Practices The University of Northern Colorado is responsible for the confidentiality and integrity of their data under existing federal, state and local legislation. This document is written to convey

Add to Reading List

Source URL: www.unco.edu

Language: English - Date: 2014-02-27 18:34:44
688Computer forensics / Data management / Computer file formats / Archive formats / Data security / File system / Backup / Data recovery / Filesystem-level encryption / System software / Computing / Software

Microsoft Word - $ASQ11615925_File000002_223921330.doc

Add to Reading List

Source URL: ils.unc.edu

Language: English - Date: 2012-03-25 22:29:06
689Visualization / R / Plot / Advanced Encryption Standard / Copyright law of the United States / Computing / Software / Free software / Ggplot2

Hands-On Data Science with R Miscellaneous Plots in R [removed] 26th August 2014 Visit http://HandsOnDataScience.com/ for more Chapters.

Add to Reading List

Source URL: handsondatascience.com

Language: English - Date: 2014-08-26 16:08:06
690Ggplot2 / Visualization / Scatter plot / Nintendo DS / R / GEOM / Advanced Encryption Standard / Software / Statistics / Free software

Hands-On Data Science with R Exploring Data with GGPlot2 [removed] 20th September 2014 Visit http://HandsOnDataScience.com/ for more Chapters.

Add to Reading List

Source URL: handsondatascience.com

Language: English - Date: 2014-09-19 18:57:13
UPDATE