Information security

Results: 50180



#Item
51

/********************************************************************** CertAgent® Command Line Interface (CACLI) Version: 1.0.0 Date: 21 June 2005 Authors: Jonathan Schulze-Hewett Copyright ©2005 Information Security

Add to Reading List

Source URL: www.infoseccorp.com.

Language: English - Date: 2018-01-16 08:16:27
    52

    INSE 6180 Security and Privacy Implications of Data Mining (4 credits) 1. General Information   

    Add to Reading List

    Source URL: dmas.lab.mcgill.ca

    Language: English - Date: 2013-08-16 01:59:33
      53

      The Information Security Specialist 02 Appin Technologies Appin

      Add to Reading List

      Source URL: www.appincoimbatore.com

      Language: English - Date: 2018-01-24 06:25:47
        54

        Dear ICCS Advisors and Stakeholders, As 2014 comes to a close, the Information, Communication and Cyber Security (ICCS) team wish all of you a Merry Christmas and Happy New Year and would like share a few highlights from

        Add to Reading List

        Source URL: smartgrid.epri.com

        Language: English - Date: 2018-04-23 15:23:30
          55

          A Cryptographic Analysis of the WireGuard Protocol Benjamin Dowling and Kenneth G. Paterson Information Security Group Royal Holloway, University of London ,

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2018-01-18 13:44:36
            56

            SMART, SECURE NETWORKS OF CONNECTED PEOPLE SECURE INFORMATION SHARING Cyber-security information sharing platform designed for secure cross-organisational collaboration and collaborative intelligence analysis.

            Add to Reading List

            Source URL: www.surevine.com

            Language: English - Date: 2016-11-15 11:52:23
              57

              Internet Security Protect Yourself Online Carver State Bank is committed to making Online Banking and Online Bill Payment safe when you access your account information. Below are some things you can do online that will h

              Add to Reading List

              Source URL: www.carverstatebank.com

              Language: English - Date: 2013-10-09 15:51:56
                58

                Using CertAgent™ for Strong User Authentication in Check Point VPN-1 Copyright© 2002 Information Security Corporation. All rights reserved. This document describes how to set up strong authentication between a SecuRe

                Add to Reading List

                Source URL: www.infoseccorp.com.

                Language: English - Date: 2018-01-16 08:16:26
                  59

                  Attack-preserving Security Protocol Transformations Binh Thanh Nguyen, David Basin, and Christoph Sprenger Institute of Information Security, ETH Zurich, Switzerland {thannguy,basin,sprenger}@inf.ethz.ch Abstract. The r

                  Add to Reading List

                  Source URL: people.inf.ethz.ch

                  Language: English - Date: 2014-04-16 16:25:39
                    60

                    Subject: Request to Attend Black Hat USA Conference 2018 Dear [decision maker name], I’m writing to request your approval for me to attend the Black Hat USA Information Security Conference to be held August 4-9, 2018 i

                    Add to Reading List

                    Source URL: www.blackhat.com

                    Language: English - Date: 2018-05-11 13:28:29
                      UPDATE