Hardware security

Results: 1760



#Item
441Thin film deposition / Electron microscopy / Functional languages / Bitmap / Fib / Semiconductor device fabrication

PBS&T FREUD Applications of FIB Invasive FIB Attacks and Countermeasures in Hardware Security Devices Valery Ray

Add to Reading List

Source URL: www.fibsem.org

Language: English - Date: 2009-08-30 14:43:19
442Credit cards / Computer law / Computing / Computer hardware / Payment Card Industry Data Security Standard / Conventional PCI / Business / Data privacy / Payment systems / Electronic commerce

ABC Coffee ASV Attestation of Compliance Customer and ASV Information Customer Information Company: ABC Coffee Shop Contact: John Coffe Title: Owner

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2014-04-22 13:48:49
443Wireless networking / Routers / Computer hardware / Wi-Fi / Computer network security / Wireless router / Wi-Fi Protected Setup / Wireless security / Netgear / Networking hardware / Computing / Technology

Wireless-N 150 Router Setup Manual NETGEAR, Inc. 350 E. Plumeria Drive San Jose, CAUSA

Add to Reading List

Source URL: www.comspancomm.com

Language: English - Date: 2012-07-18 14:17:50
444Windows Server / Server / Server hardware / X Window System / Microsoft Windows / Home server / Software / System software / Computing

Server Security Policy Document Status Security Classification

Add to Reading List

Source URL: www.ioe.ac.uk

Language: English - Date: 2015-05-04 12:55:43
445Machine-to-Machine / Computer network security / M2M / Security service / SMS / Hardware security module / Telit / SIMCom / Technology / Mobile technology / Communication

DOC Document

Add to Reading List

Source URL: onem2m.org

Language: English - Date: 2014-09-26 06:22:04
446Backup software / Ontrack / Backup / Computer hardware / Ibas / Quarter-inch cartridge / Virtual tape library / Linear Tape-Open / Database / Computing / Security / Kroll Inc.

Tape Services Maximize Accessibility and Minimize the Risk Stored in Your Enterprise Data Against the backdrop of an

Add to Reading List

Source URL: www.ibas.no

Language: English - Date: 2015-05-04 08:03:37
447Security / Error detection and correction / Watermark / Fingerprint / Convolutional code / JPEG / Computing / Information / Watermarking / Digital photography / Digital watermarking

HARDWARE IMPLEMENTATION OF A FINGERPRINTING ALGORITHM SUITED FOR DIGITAL CINEMA G. Rouvroy1,2 , F. Lefebvre3 , F.-X. Standaert1,2 , B. Macq3 , J.-J. Quisquater1,2 , J.-D. Legat2 1 UCL Crypto Group

Add to Reading List

Source URL: www.intopix.com

Language: English - Date: 2007-11-14 11:09:20
448Computer network security / Tunneling protocols / Virtual private networks / Internet privacy / Internet protocols / OpenVPN / RADIUS / Proxy server / IPsec / Computing / System software / Network architecture

Security with Passion www.endian.com Endian UTM Mercury 100 The new generation of UTM hardware appliances

Add to Reading List

Source URL: www.endian.com

Language: English - Date: 2015-04-09 11:35:41
449Intel / Information technology controls / Computer hardware / Electronics / Computer security / Host Based Security System / McAfee VirusScan / McAfee / Computing / Companies listed on the New York Stock Exchange

Data Sheet McAfee Configuration Control Audit, control, and enforce for continuous compliance

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-15 15:26:19
450Networking hardware / Computer networking / Video / Gateway / Routers / Server / Proxy server / X Window System / Personal computer / Security / Computing / Technology

 Application Solution MONITORING STATIONARY SITES Using SerVision Video Gateways to Monitor Fixed Sites with Preexisting

Add to Reading List

Source URL: www.servision.net

Language: English - Date: 2014-11-17 04:23:20
UPDATE