Hardware security

Results: 1760



#Item
291Trusted computing / Chain of trust / Kernel / Vulnerability / X Window System / DTrace / Field-programmable gate array / Ring / Trusted computing base / Computer security / Software / Computing

New Directions for Hardware-assisted Trusted Computing Policies (Position Paper) Sergey Bratus · Michael E. Locasto · Ashwin Ramaswamy · Sean W. Smith Dartmouth College

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-08-28 10:16:33
292Hacking / Computer security / Computer network security / Product teardown / Technology / Social engineering / Reverse engineering / Vulnerability / Cyberwarfare / Security / Engineering

Hands-On Hardware Hacking and Reverse Engineering Techniques

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:17
293Computer architecture / Networking hardware / Tunneling protocols / Network Address Translation / Network protocols / Allied Telesis / Virtual private network / NAT traversal / DSL modem / Computing / Computer network security / Network architecture

AlliedWareTM OS Overview of | VPN Solutions in How To Notes Introduction Allied Telesis offers How To Notes with a wide range of VPN solutions, from quick and simple solutions for connecting home and remote offices, to a

Add to Reading List

Source URL: alliedtelesis.ae

Language: English - Date: 2010-08-25 21:29:48
294Public-key cryptography / Key management / Safenet / Hardware security module / Symmetric-key algorithm / Key generation / Vormetric / Pretty Good Privacy / Cryptography / Disk encryption / Cryptographic software

SafeNet KeySecure™ PRODUCT BRIEF Enterprise Key Management

Add to Reading List

Source URL: www.edvance.com.hk

Language: English - Date: 2013-06-27 09:42:19
295Computer security / Adaptive immune system / Immunity / Symbiote / Application security / Biology / Structure / Immune system / Security / Immunology

SPARCHS: Hardware Support for Software Security Sal Stolfo Department of Computer Science Columbia University

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:32:49
296Computer security / Spam filtering / Computer networking / Network performance / Email / Unified threat management / Anti-spam techniques / Proxy server / Email filtering / Computing / Computer network security / System software

GB-Ware Software Firewall UTM System GB-Ware Software Firewall UTM System is GTA’s most flexible product offering - a total gateway perimeter solution that can be installed on hardware of your choosing. GB-Ware Key Fea

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2014-04-23 14:54:40
297Computer hardware / Technology / Modems / Logical Link Control / DSL modem / Universal Serial Bus / Asymmetric digital subscriber line / DSL filter / Wireless security / Digital subscriber line / Electronics / Networking hardware

Comtrend Wireless Modem Guide 2010.qxp

Add to Reading List

Source URL: www.tcc.coop

Language: English - Date: 2011-11-07 10:38:00
298Computer security / Malware / Rootkit / Ring / Hypervisor / Operating system / SCADA / Hardware virtualization / Kernel / System software / Software / Virtual machines

Chapter 1 LIGHTWEIGHT INTRUSION DETECTION FOR RESOURCE-CONSTRAINED EMBEDDED CONTROL SYSTEMS Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, and Sean Smith

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-07-11 16:31:17
299Television technology / High-definition television / Video signal / User interfaces / HDMI / Remote desktop software / Virtual Network Computing / Video wall / Device independent file format / Computer hardware / Electronic engineering / Computing

Christie Phoenix Government Public Utilities Security and Surveillance Telecommunications Transportation

Add to Reading List

Source URL: www.christiedigital.com

Language: English - Date: 2013-02-25 18:21:09
300Computer buses / Computer hardware / Business / Computing / Electronic commerce / Payment card industry / Conventional PCI / EMV / Hardware security module / Payment systems / Data privacy / Credit cards

Microsoft Word - PTS_Program_Guide_2010_V1.0 finaldocx

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2010-10-28 16:18:57
UPDATE