Infrastructure security

Results: 6100



#Item
301Internet Standards / Internet protocols / Routing protocols / Public-key cryptography / Computer networking / Resource Public Key Infrastructure / IP hijacking / Content delivery network / Border Gateway Protocol / Domain Name System Security Extensions / IP address / OpenDNS

RiPKI: The Tragic Story of RPKI Deployment in the Web Ecosystem Matthias Wählisch Robert Schmidt

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2015-10-23 03:22:22
302Public-key cryptography / Key management / E-commerce / Notary / Public key infrastructure / Authentication / Certificate authority / Cheque / Digital signature / Computer security / Public key certificate

Opinions on Digital21 Consultation Paper

Add to Reading List

Source URL: www.digital21.gov.hk

Language: English - Date: 2014-01-20 06:40:25
303Cloud infrastructure / Web hosting / System administration / Amazon Web Services / Network management / Sumo Logic / Amazon Virtual Private Cloud / Virtual private cloud / Cloud computing / Eucalyptus / Logicworks

WHITE PAPER Five AWS Practices Enhancing Cloud Security through Better Visibility

Add to Reading List

Source URL: www.sumologic.com

Language: English - Date: 2016-07-18 17:15:30
304United States Department of Homeland Security / Cyberwarfare / Infrastructure / National security / Critical infrastructure protection / Security engineering / DHS National Protection and Programs Directorate / Computer security / Sensitive security information

GAO-16-791T, CRITICAL INFRASTRUCTURE PROTECTION:DHS Has Made Progress in Enhancing Critical Infrastructure Assessments, but Additional Improvements are Needed

Add to Reading List

Source URL: docs.house.gov

Language: English
305Computer access control / Cybercrime / Key management / Public-key cryptography / Transport Layer Security / Phishing / Certificate authority / Multi-factor authentication / Identity theft / Public key infrastructure / Authentication / Security token

Building an Identity Management Infrastructure Today That Will Continue to Work Tomorrow IdenTrust B

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2016-05-19 18:55:28
306Public-key cryptography / Public key infrastructure / Cryptography / Ko / Certificate authority / End-to-end encryption

Efficient Key Authentication Service for Secure End-to-end Communications Mohammad Etemad Alptekin Küpçü

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
307Payment systems / Key management / Public key infrastructure / Public-key cryptography / Computer access control / Voucher / School voucher / Certificate authority / Smart card / Security token / Public key certificate / Credit card

IdenTrust Global Common (IGC) VOUCHER ORDER FORM Use this form to purchase 5+ IdenTrust Global Common (IGC) vouchers if using a credit card, or 1+ if using a purchase order for payment.  

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2016-03-04 17:45:08
308E-commerce / Payment systems / Key management / Public key certificate / Public key infrastructure / Public-key cryptography / Post-office box / Money order / Diploma / West Virginia University

West Virginia University Replacement Diploma & Certificate Form The name under which you attended WVU Student ID or Social Security Number

Add to Reading List

Source URL: assets.slate.wvu.edu

Language: English - Date: 2016-07-12 08:16:12
309Public services / Water technology / Water supply / Water industry / Water metering / Computer security

Kennebunk, Kennebunkport and Wells Water District Automated Meter Infrastructure (AMI) How the Project Affects You How will appointments be made? We will be contacting all of our customers to make an appointment, primar

Add to Reading List

Source URL: kkw.org

Language: English - Date: 2016-03-29 05:44:59
310United States Department of Homeland Security / Critical infrastructure protection / Cyber-security regulation / Center for Homeland Defense and Security / Homeland Security Act / Homeland security / Critical infrastructure / United States Computer Emergency Readiness Team / National Infrastructure Protection Plan / National Strategy to Secure Cyberspace / Computer security / National Cyber Security Division

101000101010110101001010101011010100101110101010010111010101010101 101101010101010110110101010101001010101010101010101011010100101010 010111010110101100101010101010101010101010010101010101011010101010 the cip report C E

Add to Reading List

Source URL: cip.gmu.edu

Language: English - Date: 2013-11-15 12:18:54
UPDATE