F-Secure

Results: 745



#Item
31

Real and Virtual Spaces Nicholas F. Polys, Ph.D. Advanced Research Computing Peter Sforza Center for Geospatial Information Technology

Add to Reading List

Source URL: secure.hosting.vt.edu

Language: English - Date: 2016-02-23 13:53:46
    32

    Secure information flow and program logics Lennart Beringer, Martin Hofmann Institut f¨ur Informatik, Universit¨at M¨unchen Oettingenstrasse 67, 80538 M¨unchen, Germany {beringer|mhofmann}@tcs.ifi.lmu.de

    Add to Reading List

    Source URL: www.tcs.ifi.lmu.de

    Language: English - Date: 2015-05-05 05:18:49
      33Teleconferencing / Computer-mediated communication / Videotelephony / Groupware / Technology / Educational technology / Computing / Assistive technology / Web conferencing / Videoconferencing / Telecommuting / Computer-supported collaboration

      White Paper GOVERNMENT AGENCIES SEEK SECURE, H I G H - P E R F O R M A N C E W E B C O L L A B O R AT I O N How to Manage the Risks and Opportunities of Networked Conferencing, Meetings and Training

      Add to Reading List

      Source URL: www.ilinc.com

      Language: English - Date: 2012-05-14 19:31:17
      34Communication design / Marketing / Advertising / Academia / Communication / Sponsor / Asbury Park /  New Jersey / Product placement / TED / Brand

      AsburyAgile.com :: 630 Mattison Ave :: Asbury Park, NJDEAR POTENTIAL SPONSOR, We would love to secure your sponsorship for Asbury Agile 2011, the first annual Jersey shore web & technology con

      Add to Reading List

      Source URL: f.cl.ly

      Language: English - Date: 2011-07-26 11:00:44
      35Computing / Internet / Internet Standards / Internet protocols / Network architecture / DNSSEC / Domain Name System Security Extensions / Key management / Public-key cryptography / Domain Name System / Hash table / Namespace

      Design of a Secure and Decentralized Location Service for Agent Platforms B.J. Overeinder1 , M.A. Oey1 , R.J. Timmer1 , R. van Schouwen1 , E. Rozendaal2 , and F.M.T. Brazier1 1

      Add to Reading List

      Source URL: www.nlnetlabs.nl

      Language: English - Date: 2009-06-27 06:06:52
      36Antivirus software / Cloud infrastructure / Cloud computing / Computer security / Malware / F-Secure / Zscaler / HP Cloud

      F-Secure Security Cloud: Purpose, function and benefits

      Add to Reading List

      Source URL: www.f-secure.com

      Language: English - Date: 2015-11-04 04:10:16
      37Secure communication / Cryptographic software / Cryptographic protocols / Internet protocols / Internet Standards / Transport Layer Security / OpenSSL / Cipher suite / GnuTLS / WolfSSL / Handshaking / HTTPS

      F LEX TLS A Tool for Testing TLS Implementations Benjamin Beurdouche, Antoine Delignat-Lavaud, Nadim Kobeissi, Alfredo Pironti, and Karthikeyan Bhargavan INRIA Paris-Rocquencourt Abstract

      Add to Reading List

      Source URL: www.usenix.org

      Language: English - Date: 2016-02-21 19:32:47
      38Computing platforms / MINIX / Firewall / Microkernel / Netfilter

      Secure and Reliable Firewall Systems based on MINIX 3 R¨ udiger Weis Beuth Hochschule f¨ ur Technik Berlin

      Add to Reading List

      Source URL: www.minix3.org

      Language: English - Date: 2016-02-24 10:09:43
      39

      PDF Document

      Add to Reading List

      Source URL: www.f-secure.com

      - Date: 2015-02-18 01:14:28
        40

        PDF Document

        Add to Reading List

        Source URL: www.f-secure.com

        - Date: 2014-09-11 08:24:29
          UPDATE