Intel Security

Results: 436



#Item
351Credit cards / Computer law / Data privacy / Technology / Computing / Bank card number / Payment Card Industry Data Security Standard / Intel / Security token / Payment systems / Cryptography / Tokenization

Case Study Intel® Mashery™ API Gateway – Tokenization Cloud Security Canadian Airline Deploys Intel® Mashery™ API

Add to Reading List

Source URL: www.mashery.com

Language: English - Date: 2014-09-30 12:51:43
352Secretaría de Inteligencia / National security / Government / Security / Department of Intelligence and Security / Law enforcement in Algeria / DRS

2014- Metamorphosis of Alg Intel Services _AC 3.10.2014_

Add to Reading List

Source URL: nesa-center.org

Language: English - Date: 2014-10-07 12:12:03
353Computing / Software / Companies listed on the New York Stock Exchange / Computer security / Whitelist / Intel / McAfee VirusScan / Host Based Security System / Antivirus software / McAfee / System software

Data Sheet McAfee Application Control for Desktops Improve protection, gain application visibility, and reduce patching

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-09-19 14:13:13
354Virtual machines / Multilevel security / Virtualization / Virtuality / Trusted Computing Group / Ring / Hypervisor / Virtual private network / Intel vPro / System software / Computing / Software

Secure Virtualization: Today’s Reality Secure virtualization is an exciting new technology that allows you to secure your computing systems, networks, and data while simultaneously remaining connected to trusted and un

Add to Reading List

Source URL: www.gdc4s.com

Language: English - Date: 2014-12-03 04:04:56
355Computing / Computer crimes / Social engineering / Phishing / Malware / Internet fraud / Email spam / Internet security / Spam / Internet / Spamming / Cybercrime

Cyber Intel Advisory: Boston Marathon Bombing Is Being Used to Disseminate Malware and Conduct Financial Fraud 16 April 2013 Insert your logo here[removed]Integrated Intelligence Center

Add to Reading List

Source URL: www.cisecurity.org

Language: English - Date: 2013-04-17 12:30:02
356Access control / Electronic commerce / Credential / Knowledge / Authentication / Public key certificate / Password / Digital credential / Electronic authentication / Cryptography / Security / Identity management

Statement by Pat McGregor Chief Information Security Architect Intel Corporation Before the Commission on Online Child Protection 9 June 2000

Add to Reading List

Source URL: www.copacommission.org

Language: English - Date: 2013-02-05 12:44:03
357Records management / IRS tax forms / Intel Core / Academi / Government / Security / Business / Administration / Information technology management

DOC Document

Add to Reading List

Source URL: www.sos.wa.gov

Language: English - Date: 2012-11-30 17:18:37
358Computing / Out-of-band management / Intel vPro / Intel Active Management Technology / Intel / Trusted Execution Technology / AES instruction set / X86 virtualization / McAfee / System software / X86 architecture / Computer architecture

Sales Brief Intel and McAfee 2013 Security Benefits Intel and McAfee deliver a new level of strengthened security innovation utilizing embedded hardware security technologies for unprecedented protection and

Add to Reading List

Source URL: smb.intel.in

Language: English - Date: 2013-08-23 21:00:30
359Information technology management / Records management / Academi / Intel Core / Archivist / Security / Accountability / Archival science / Business / Administration

DOC Document

Add to Reading List

Source URL: www.sos.wa.gov

Language: English - Date: 2012-11-30 17:19:57
360Administration / Information technology management / Records management / Academi / IRS tax forms / Youth detention center / Intel Core / Business / Government / Security

DOC Document

Add to Reading List

Source URL: www.sos.wa.gov

Language: English - Date: 2014-06-27 18:00:54
UPDATE