Infrastructure security

Results: 6100



#Item
651Technology / Automated teller machine / Automation / Banks / Burglar alarm / Duress code / Motion detection / Personal identification number / Access control / Security / Payment systems / Safety

Bank security Adding value through operational risk management Answers for infrastructure.

Add to Reading List

Source URL: us.sourcesecurity.com

Language: English - Date: 2010-01-08 03:51:53
652Cryptographic protocols / Electronic commerce / X.509 / Diffie–Hellman key exchange / Public key infrastructure / Man-in-the-middle attack / Key authentication / Public key certificate / Key / Cryptography / Key management / Public-key cryptography

Lecture 13: Certificates, Digital Signatures, and the Diffie-Hellman Key Exchange Algorithm Lecture Notes on “Computer and Network Security” by Avi Kak () February 26, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-02-26 14:50:25
653S/MIME / Public key infrastructure / Email / Digital signature / Revocation list / Certificate authority / Web of trust / PKCS / Transport Layer Security / Cryptography / Public-key cryptography / Key management

Securing E­mail with Digital Certificates  Author: Steve Moitozo <> Created: Revised: Revision: 4

Add to Reading List

Source URL: www.geekwisdom.com

Language: English - Date: 2009-02-04 13:42:40
654Key management / Cryptographic protocols / Internet standards / PKI Resource Query Protocol / X.509 / Public key infrastructure / SCVP / Online Certificate Status Protocol / Public key certificate / Cryptography / Public-key cryptography / Internet protocols

Journal of Computer Security–420 DOIJCSIOS Press 397

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-07-12 10:13:55
655Computer network security / Crime prevention / Computer crimes / International Multilateral Partnership Against Cyber Threats / Access control / Cyber security standards / Critical infrastructure protection / Security / Computer security / National security

Securing The Human for Utilities (STH.Utility): Version 5 Coming Soon! Securing The Human is currently in the process of finalizing STH.Utility Version 5 training. We plan to have Version 5 available this summer but wan

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2015-04-17 12:03:23
656Remote backup service / Cloud backup / Computing / Public safety / Security / Backup software / Backup / Data security

CLIENT SUCCESS STORY $700 Million Fashion Conglomerate The Morét Group Leverages Their Own Infrastructure to Backup Over 8 Terabytes of Data with BUMI Here THE CHALLENGE

Add to Reading List

Source URL: bumi.com

Language: English - Date: 2013-10-08 10:27:02
657Cryptographic protocols / Internet protocols / Internet standards / X.509 / Revocation list / Public key certificate / Certificate policy / Public key infrastructure / Self-signed certificate / Cryptography / Key management / Public-key cryptography

Managing Interoperability in Non-Hierarchical Public Key Infrastructures Peter M. Hesse Gemini Security Solutions 1

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-26 10:12:32
658Cyberwarfare / Computer security / Computer network security / Military technology / Critical infrastructure protection / Phishing / Threat / International Multilateral Partnership Against Cyber Threats / Attack / Cybercrime / Computer crimes / Security

GAO-15-573T, CYBERSECURITY: Actions Needed to Address Challenges Facing Federal Systems

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2015-04-22 14:44:00
659United States Department of Homeland Security / Infrastructure / Civil defense / Security engineering / Critical infrastructure protection / Critical infrastructure / National Protection and Programs Directorate / New York State Energy Research and Development Authority / Homeland Security Grant Program / Public safety / National security / Emergency management

Andrew M. Cuomo Governor John P. Melville Commissioner

Add to Reading List

Source URL: www.dhses.ny.gov

Language: English - Date: 2015-04-22 12:41:45
660Cloud computing / Security / Outsourcing / Data security / Information security / Information Technology Infrastructure Library / Service-level agreement / Business continuity / Cloud computing security / Information technology management / Computing / Computer security

UCS Level 2 Report Issued to MSPAlliance Unified Certification Standard (UCS) Report Copyright 2014 www.mspalliance.com/ucs | Welcome to the UCS report which stands for Unified Certification Stand

Add to Reading List

Source URL: www.dataprise.com

Language: English - Date: 2014-10-08 16:48:40
UPDATE