Hardware security

Results: 1760



#Item
871Virtual machines / Computer networking / Virtual firewall / Cloud infrastructure / Computer network security / Virtual security switch / Hardware virtualization / Cloud computing / Computing / Software

Flexible Computing Cost-effective virtual machines to host your applications la vie change avec Flexible Computing

Add to Reading List

Source URL: www.orange.mu

Language: English - Date: 2015-02-06 04:26:01
872Safenet / Hypervisor / Hardware security module / Virtualization / Cloud computing / Hyper-V / Secure communication / Cryptographic software / System software / Computing / Software

SafeNet Ushers in New Era of Elastic Encryption by Announcing World’s First Crypto Hypervisor Multi-tenant, High-Assurance Key Vaulting for Cloud Migration • • •

Add to Reading List

Source URL: www.infosecurityproject.com

Language: English - Date: 2015-02-04 04:23:24
873USB flash drive / Universal Serial Bus / Personal computer / Laptop / Encryption / Removable media / Solid-state drive / Mobile computing / Computer hardware / Classes of computers / Computing

Tips for Information Security GUARDING THE INFORMATION (Mainly extracted from "A PRACTICAL GUIDE TO IT SECURITY FOR EVERYONE WORKING IN HOSPITAL AUTHORITY from HOIT, revised on May 2008") 

Add to Reading List

Source URL: www.cuhk.edu.hk

Language: English - Date: 2009-08-25 06:36:12
874Computer storage / Fault-tolerant computer systems / Backup / Data security / Disk partitioning / RAID / Disk formatting / Logical volume management / Hard disk drive / Computing / System software / Computer hardware

LAB REPORTS XactCopy XactCopy

Add to Reading List

Source URL: www.duocor.com

Language: English - Date: 2010-11-19 03:15:36
875Key management / DNSSEC / Domain Name System Security Extensions / ICANN / Hardware security module / Key Ceremony / Verisign / Cryptography / Domain name system / Internet

  Internet  Corporation  for  Assigned  Names  and  Numbers   Root DNSSEC KSK Ceremony 18 Thursday August 14, 2014

Add to Reading List

Source URL: data.iana.org

Language: English - Date: 2014-08-22 13:17:08
876Data security / Computer storage / Data management / Non-volatile memory / Computer data storage / Backup / Data storage device / Data theft / Hard disk drive / Information science / Computer hardware / Computing

RTF Document

Add to Reading List

Source URL: www.tisn.gov.au

Language: English - Date: 2014-09-17 21:02:58
877Crime prevention / National security / International trade / Cryptography / Coprocessor / Export / Microprocessor / Information security / Computer / Security / Computer hardware / Computing

Microsoft Word - NC058A.doc

Add to Reading List

Source URL: www.stc.tid.gov.hk

Language: English - Date: 2013-01-08 02:34:21
878Electronic engineering / Technology / IEEE 802.11 / Cryptographic protocols / Networking hardware / Wireless security / Wi-Fi / Wireless access point / Wireless router / Computer network security / Computing / Wireless networking

Tip Sheet Securing your home or office Wi-Fi

Add to Reading List

Source URL: www.accan.org.au

Language: English - Date: 2015-01-23 00:32:12
879Computer network security / Wireless / Networking hardware / Wi-Fi / Data security / Router / Wireless access point / Wireless security / Service set / Wireless networking / Technology / Computing

Information Security Animations – Security on Wi-Fi Setup (Script) Security on Wi-Fi Setup Wi-Fi refers to users using a wireless computer device to connect to the Internet via a wireless network router within the wir

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-08-31 06:18:37
880Intel vPro / Computer hardware / Disk encryption / Intel Active Management Technology / AES instruction set / McAfee / Intel / Wake-on-LAN / Advanced Encryption Standard / Computing / Out-of-band management / Cryptography

Intel_McAfee_Security_horiz_4c

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-31 20:04:17
UPDATE