Hardware security

Results: 1760



#Item
331Computer hardware / Crime prevention / National security / Computer network security / Fujitsu / USB flash drive / Data loss prevention software / Data loss / Data erasure / Computing / Security / Computer security

Data Loss Prevention Technologies  Tomoyoshi Takebayashi  Ryusuke Masuoka  Hiroshi Tsuda

Add to Reading List

Source URL: www.fujitsu.com

Language: English - Date: 2010-01-25 05:17:58
332Access control / Identification / ISO standards / Ubiquitous computing / Biometrics / Fingerprint recognition / Fingerprint / Card reader / Two-factor authentication / Security / Fingerprints / Computer hardware

Hamster™ Pro Duo/CL SecuGen Hamster Pro Duo/CL is suitable for any contactless smart card application where dual factor authentication is needed for higher security without sacrificing convenience. It features the indu

Add to Reading List

Source URL: www.secugen.com

Language: English - Date: 2015-02-13 17:59:40
333Server / Server hardware / Subnetwork / Subnet / ISCSI / Network architecture / OSI protocols / Computing

Trading off Security in a Service Oriented Architecture Garret Swart? , Benjamin Aziz† , Simon N. Foley‡ , and John Herbert‡ ? IBM Almaden Research Center, 650 Harry Road, San Jose, CA, USA

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2005-05-20 03:03:27
334Programming language implementation / Live migration / Hyper-V / VM / Hypervisor / Xen / Spring / Hardware virtualization / Virtual firewall / System software / Software / Virtual machines

DACSA: A Decoupled Architecture for Cloud Security Analysis Jason Gionta1 , Ahmed Azab3 , William Enck1 , Peng Ning1 , and Xiaolan Zhang2 1 North Carolina State University {jjgionta,whenck,pning}@ncsu.edu

Add to Reading List

Source URL: gionta.org

Language: English - Date: 2014-07-20 15:18:58
335Hyper-V / Virtual machines / Virtual firewall / Remote desktop / Comparison of platform virtual machines / Hardware virtualization / System software / Software / Windows Server

The first agentless Security, Virtual Firewall, AntiMalware and Compliance Solution built for Windows Server 2012 Hyper-V #1 Hyper-V Security The first agentless Security, Virtual Firewall, Anti-Malware and Compliance S

Add to Reading List

Source URL: www.5nine.com

Language: English - Date: 2014-09-20 16:34:29
336Security / Technology / Server / Server hardware / Information security / Internet / Operating system / Acceptable use policy / Backup / Data security / Computer security / Computing

IT Acceptable Use Policy Introduction This document establishes the rules for the acceptable use of the Lincoln College IT facilities and network infrastructure. These rules are necessary to preserve the integrity, avail

Add to Reading List

Source URL: www.lincoln.ox.ac.uk

Language: English - Date: 2015-04-20 08:44:34
337Hardware virtualization / Hypervisor / TenAsys / Virtualization / Virtual security appliance / Hyper-V / Comparison of platform virtual machines / Embedded hypervisor / System software / Software / Virtual machines

Embedded Virtualization & Cyber Security for Industrial Automation HyperSecured® PC-based Control and Operation Industrial controllers and HMIs today mostly lack protective functions for their IT and network security. U

Add to Reading List

Source URL: www.innominate.com

Language: English - Date: 2013-02-09 20:02:37
338Computer hardware / USB / Card reader / Fingerprint recognition / Universal Serial Bus / Fingerprint / Access control / ISO/IEC / BioAPI / Fingerprints / Smart cards / Security

iD-SERIAL iD-USB SC iD-USB SC/PIV TM

Add to Reading List

Source URL: www.secugen.com

Language: English - Date: 2014-12-23 17:09:43
339OSI protocols / Wireless security / Wi-Fi / Modem / Router / Network architecture / Internet access / 4G / Wireless router / Computer network security / Networking hardware / Computing

Smart Presence™ System Requirements About This Requirements Guide

Add to Reading List

Source URL: www.suitabletech.com

Language: English - Date: 2015-05-20 03:15:28
340Computing / Server appliance / Wireless / Computer network security / Wi-Fi / Wireless security / Residential gateway / Router / Wireless network interface controller / Wireless networking / Technology / Networking hardware

Comtrend WR-5882 Wireless-N Broadband Router Logging In to Change the SSID & Wireless Security The SSID is the broadcast name of your wireless signal or the name of the connect you will see from a wireless

Add to Reading List

Source URL: www.tcc.coop

Language: English - Date: 2013-06-13 13:47:10
UPDATE