HTTP Secure

Results: 1425



#Item
211Computer security / Identity management / Identity management systems / Cloud standards / HTTP / Security Assertion Markup Language / OAuth / HTTP Secure / SAML 1.1 / Computing / Cryptographic protocols / Security

PDF Document

Add to Reading List

Source URL: www.tuxed.net

Language: English - Date: 2015-04-05 14:21:35
212ISCSI / SCSI / Universal Serial Bus / IP address / Network architecture / Electrical connector / Computer networking / Computing / Ethernet / OSI protocols

MaxNAS Quick Install Guide The MaxNAS is designed for universal compatibility. It features SMB/CIFS, NFS, FTP, iSCSI target and hosting, USB direct attachment, as well as Webdisk/Secure Webdisk http-based connectivity th

Add to Reading List

Source URL: www.micronet.com

Language: English - Date: 2013-02-26 14:39:36
213Cryptographic protocols / Secure communication / Password / FileVault / HTTP Secure / Security / Computing / Cryptography / Cryptographic software / Mac OS X

Technical Specifications CrashPlan PROe Security CrashPlan PROe is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops often

Add to Reading List

Source URL: essentials.code42.com

Language: English - Date: 2015-05-01 23:23:25
214Internet / Password / HTTP cookie / Text messaging / Message transfer agent / Voice-mail / Gmail interface / Email / Computer-mediated communication / Computing

Secure e-mail - information to contacts The Swedish Courts regularly use e-mail as a compliment to traditional mail correspondence. In compliance with the Swedish Personal Data Act all electronic court communicati

Add to Reading List

Source URL: www.kammarrattenistockholm.domstol.se

Language: English - Date: 2014-12-09 05:27:59
215Internet / Password / HTTP cookie / Text messaging / Message transfer agent / Voice-mail / Gmail interface / Email / Computer-mediated communication / Computing

Secure e-mail - information to contacts The Swedish Courts regularly use e-mail as a compliment to traditional mail correspondence. In compliance with the Swedish Personal Data Act all electronic court communicati

Add to Reading List

Source URL: www.forvaltningsrattenistockholm.domstol.se

Language: English - Date: 2014-02-25 08:16:28
216Cryptographic protocols / Internet privacy / Secure communication / .onion / Transport Layer Security / Certificate authority / Tor / Web of trust / HTTP Secure / Cryptography / Public-key cryptography / Key management

Genuine onion: Simple, Fast, Flexible, and Cheap Website Authentication Paul Syverson Griffin Boyce

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-11 00:01:25
217Routing / Computer network security / Internet protocols / Internet standards / Border Gateway Protocol / Denial-of-service attack / Internet exchange point / HTTP Secure / Internet / Network architecture / Computing

Trusted Networks Initiative Summary VersionTrusted Networks Initiative The Trusted Networks Initiative aims at a global

Add to Reading List

Source URL: www.cybersecurityweek.nl

Language: English - Date: 2015-04-02 05:32:45
218Secure communication / Key management / Internet protocols / Transport Layer Security / HTTP Secure / Extended Validation Certificate / Public key certificate / Cipher suite / Certificate authority / Cryptography / Cryptographic protocols / Public-key cryptography

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:30
219Cloud standards / Representational state transfer / URI schemes / Semantic Web / Uniform resource identifier / Resource / Hypertext Transfer Protocol / Uri / Computing / World Wide Web / Software architecture

Scalable, Reliable, and Secure RESTful services Stuff you need to know about REST and HTTP What this talk is NOT

Add to Reading List

Source URL: archive.apachecon.com

Language: English - Date: 2011-09-21 13:50:22
220Network architecture / Internet protocols / Computer network security / Secure communication / Cryptographic software / Transport Layer Security / Virtual private network / IPsec / HTTP Secure / Cryptographic protocols / Computing / Data

White_paper_secure_protocolsFINAL

Add to Reading List

Source URL: www.insidesecure.com

Language: English
UPDATE