Infrastructure security

Results: 6100



#Item
201Cloud infrastructure / Cloud storage / CloudPassage / Computer security / Cloud computing / VMware / Orchestration / Provisioning / Data center / HP CloudSystem / HP Business Service Automation

SOLUTION BRIEF Automated Security and Compliance. Preserves the Agility of Your VMware Environments. SECURING YOUR VMWARE INFRASTRUCTURE

Add to Reading List

Source URL: 2hvcbhl545p46lgtq2nhxci9-wpengine.netdna-ssl.com

Language: English - Date: 2016-05-25 17:32:00
202Public-key cryptography / Key management / Transport Layer Security / Public key infrastructure / Cryptographic protocols / Certificate authority / Form / Public key certificate / HTTPS / Email

Thank you for choosing IdenTrust as your ECA Certificate vendor! These instructions are for ECA Medium Hardware certificates **NOTE** Most programs allow the Medium Token certificate be used as well as the Medium Hardwar

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2016-05-19 18:55:28
203Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Biometrics / Certificate authority / Man-in-the-middle attack / X.509 / Authentication / Key / Revocation list / Public key certificate

Preprint of paper to appear at WIFS2010 BEYOND PKI: THE BIOCYPTOGRAPHIC KEY INFRASTRUCTURE W. Scheirer1,2 , W. Bishop2 and T. Boult1,2 1

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2010-11-05 15:10:51
204Key management / Public key infrastructure / Public-key cryptography / Transport Layer Security / E-commerce / StartCom / Certificate authority / Extended Validation Certificate / Public key certificate / S/MIME / X.509 / Code signing

StartCom Certification Authority Policy & Practice Statements Version: Status: Updated: Copyright:

Add to Reading List

Source URL: www.startssl.com

Language: English - Date: 2015-11-26 02:27:34
205Key management / Public key infrastructure / Transport Layer Security / Public-key cryptography / E-commerce / Extended Validation Certificate / StartCom / Certificate authority / Public key certificate

StartCom Extended Validation Application Request Instructions Steps The following documents are required to be completed and submitted to StartCom

Add to Reading List

Source URL: www.startssl.com

Language: English - Date: 2016-06-29 06:43:16
206Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Computer access control / Smart card / Public key certificate / Certificate authority / Security token / Authentication / Certificate policy / X.509

eID Management The right choice for E-Private Banking Liechtensteinische Landesbank AG E-banking is an important service

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:39
207Types of insurance / Internal Revenue Code / Long-term care insurance / Health insurance / Insurance / Deficit Reduction Act / Social Security / Medicaid / National Information Infrastructure Protection Act / Empowering Patients First Act

Microsoft Word - bulletin.doc

Add to Reading List

Source URL: www.ksinsurance.org

Language: English - Date: 2015-04-03 16:10:00
208Key management / Public key infrastructure / Public-key cryptography / Transport Layer Security / Certificate policy / Energy Sciences Network / Revocation list / Public key certificate / Information security

Procedures and guidelines for the Policy Management Authority of the ESnet PKI Version X.X - DRAFT

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2004-02-11 16:14:38
209Key management / Public key infrastructure / Public-key cryptography / Transport Layer Security / StartCom / Certificate authority / Extended Validation Certificate / Public key certificate / X.509 / S/MIME / Root certificate / Certificate policy

StartCom Ltd. StartSSL™ Certificates & Public Key Infrastructure Eilat, Israel StartCom Certificate Policy & Practice Statements

Add to Reading List

Source URL: www.startssl.com

Language: English - Date: 2016-05-16 01:53:08
210Smartphones / Mathematical optimization / Operations research / Multi-objective optimization / Android / Mobile app / IOS / Google Play / Data center infrastructure management / Mobile security

Optimizing User Experience in Choosing Android Applications Rubén Saborido1 , Giovanni Beltrame2 , Foutse Khomh3 , Enrique Alba4 , Giuliano Antoniol1 SOCCER1 –MIST2 –SWAT3 1 Labs., DGIGL, Polytechnique Montréal, Ca

Add to Reading List

Source URL: swat.polymtl.ca

Language: English - Date: 2016-02-09 14:05:39
UPDATE