HTTP Secure

Results: 1425



#Item
121Security / Data / Identity management / Security Assertion Markup Language / Password / HTTP Secure / Computing / Cryptographic protocols / Secure communication

Security  Guide,  April  2015           Zoom  is  a  cloud  service  that  provides  a  3-­‐in-­‐1  meeting  platform  with  HD  video  conferencing

Add to Reading List

Source URL: d24cgw3uvb9a9h.cloudfront.net

Language: English - Date: 2015-05-11 03:21:53
122Embedded Linux / Web browsers / Google Chrome / HTTP cookie / Cross-site scripting / JavaScript / Opera / Firefox / Web page / Software / Portable software / Cloud clients

Whitepaper – Attacking Android browsers via intent scheme URLs Takeshi Terada / Mitsui Bussan Secure Directions, Inc. MarchIntroduction

Add to Reading List

Source URL: www.mbsd.jp

Language: English - Date: 2014-10-29 20:39:11
123Internet / Cryptography / Internet standards / Internet protocols / Electronic commerce / Transport Layer Security / HTTP Secure / Password / FTPS / Computing / Cryptographic protocols / Secure communication

Instant, Secure and Accountable Lua Security Whitepaper Security is Paramount We know that when you communicate with your team, information security is paramount.

Add to Reading List

Source URL: citrixready.citrix.com

Language: English - Date: 2015-06-09 15:09:38
124Web browsers / FTP clients / URI schemes / Google Chrome / HTTP Secure / Internet Explorer / Taskbar / Firefox / About URI scheme / Software / News aggregators / Portable software

NJ Courts Will Disable SSLv3; What You Should Do Now On Monday, April 6th, 2015, NJ Courts Online Portal will no longer support the SSLv3 protocol. SSLv3 is vulnerable to attacks known as POODLE, which could compromise

Add to Reading List

Source URL: www.judiciary.state.nj.us

Language: English - Date: 2015-04-06 17:22:05
125CA/Browser Forum / X.509 / Public key certificate / Certificate authority / Root certificate / Online Certificate Status Protocol / Revocation list / Certificate policy / HTTP Secure / Cryptography / Public-key cryptography / Key management

Microsoft Word - BRv1.2.4-redlined.doc

Add to Reading List

Source URL: cabforum.org

Language: English - Date: 2015-05-12 12:04:33
126HTTP / Internet protocols / Internet standards / Cryptographic protocols / Secure communication / Domain Name System Security Extensions / Cross-site scripting / World Wide Web / IPv6 / Internet / Computing / Network architecture

STREWS Strategic Research Roadmap for European Web Security FP7-ICT, Project Nohttp://www.strews.eu/

Add to Reading List

Source URL: www.strews.eu

Language: English - Date: 2015-05-12 14:33:32
127Internet standards / Internet protocols / Secure communication / Cryptographic software / Cryptographic protocols / CURL / FTPS / Transport Layer Security / HTTP pipelining / Computing / Software / Internet

Curl user poll 2015 “retina-burning blue” Daniel Stenberg, May 26,

Add to Reading List

Source URL: daniel.haxx.se

Language: English - Date: 2015-05-26 02:16:59
128Security / Password / HTTP cookie / Internet privacy / HTTP Secure / Email / Self-service password reset / Apple ID / HTTP / Internet / Computing

Quick Reference Guide Frequently Asked Questions Compass Online Application FAQ’s Login Access and Create a New Account I do not have access to a computer, how can I submit an online application?

Add to Reading List

Source URL: www.peoplesofthelp.uconn.edu

Language: English - Date: 2014-04-14 14:04:58
129HTTP / Cryptographic protocols / Key management / Public-key cryptography / Secure communication / HTTP Strict Transport Security / HTTP Secure / Transport Layer Security / HTTP cookie / Software / Cryptography / Computing

Upgrading HTTPS in Mid-Air: An Empirical Study of Strict Transport Security and Key Pinning Michael Kranch Joseph Bonneau

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2015-02-07 12:44:05
130Cryptographic protocols / Key management / Secure communication / Electronic commerce / Transport Layer Security / HTTP Secure / Public key certificate / X.509 / Java version history / Cryptography / Computing / Public-key cryptography

Magdeburger Journal zur Sicherheitsforschung Gegründet 2011 | ISSN: Herausgegeben von Stefan Schumacher und Jörg Sambleben Erschienen im Magdeburger Institut für Sicherheitsforschung This article appears in

Add to Reading List

Source URL: www.sicherheitsforschung-magdeburg.de

Language: English - Date: 2015-03-20 16:20:14
UPDATE