Intel Security

Results: 436



#Item
411National security / 107th United States Congress / Patriot Act / Privacy law

October 25, 2001 CONGRESSIONAL RECORD — SENATE We have the ability, with our intel­ ligence agencies and our law enforce­

Add to Reading List

Source URL: www.justice.gov

Language: English - Date: 2009-03-03 15:52:25
412Tender offer / Stock market / Finance / Williams Act / Safe harbor / Security / Financial economics / Mergers and acquisitions / Corporate finance / Business

Intel Corporation 2200 Mission College Blvd. P. O. Box[removed]Santa Clara, CA[removed]8080

Add to Reading List

Source URL: www.sec.gov

Language: English - Date: 2006-02-22 10:12:22
413Trusted computing / Trusted Execution Technology / x86 architecture / Intel / Trusted Computing Group / Ring / Malware / Intel vPro / Computer security / Computer hardware / Computing

Bringing The Trust Back Into Cyber Space: Extending Intel’s commitment to Security Steve Pawlowski Intel Senior Fellow

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:53
414Cloud computing / Trusted Execution Technology / Hyper-V / X86 virtualization / Hypervisor / VMware / Virtualization / Rootkit / Virtual Iron / System software / Software / Virtual machines

Trustworthy Cloud Computing Creating Trustworthy Cloud Systems Steve Orrin Director of Security Solutions Software and Services Group Intel, Corp.

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:56
415AACS LA / Security of Advanced Access Content System / Media Key Block / Advanced Access Content System / Digital rights management / Cryptography

Advanced Access Content System (AACS) Pre-recorded Video Book Intel Corporation International Business Machines Corporation Microsoft Corporation Panasonic Corporation

Add to Reading List

Source URL: www.aacsla.com

Language: English - Date: 2012-11-21 04:31:07
416Records management / Academi / Archivist / Intel Core / Security / Accountability / Business / Administration / Information technology management

DOC Document

Add to Reading List

Source URL: www.sos.wa.gov

Language: English - Date: 2012-11-30 17:26:57
417Defense Intelligence Agency / Security / Central Intelligence Agency / National Security Agency / National security / Mass surveillance / Government

F:\PKB\IN1\FY20 12\AMDT -DEF-INTEL_TRAINING_OOl.XML TO H.R. 1892

Add to Reading List

Source URL: intelligence.house.gov

Language: English - Date: 2011-05-26 17:44:55
418Cybercrime / Email / Computer crimes / Computer network security / Phishing / Email spam / Malware / Spam / Internet security / Internet / Spamming / Computing

Traffic Light Protocol: WHITE Cyber Intel Advisory: UK Royal Birth Being Used to Disseminate Malware and Fraud 24 July 2013

Add to Reading List

Source URL: www.nh.gov

Language: English - Date: 2013-07-30 08:53:27
419HP EliteBook / Hewlett-Packard / Intel Active Management Technology / Laptop / Intel vPro / HP ePrint / HP Mini / HP-UX / Computing / Technology / Computer hardware

Data sheet HP EliteBook 840 Notebook PC Ultra-productive in and out of the office thanks to security, performance and management features. HP recommends Windows.

Add to Reading List

Source URL: hpshop.cnsys.bg

Language: English - Date: 2014-03-26 11:42:06
420Computer security / Malware / Rootkit / Intel Active Management Technology / Direct memory access / Ring / Intel / Keystroke logging / Computer hardware / Computing / Cyberwarfare

Evaluating “Ring -3” Rootkits Patrick Stewin∗ ∗ Security in Telecommunications Technische Universit¨at Berlin, D[removed]Berlin, Germany patrickx{at}sec.t-labs.tu-berlin.de In 2009, security researchers discovered

Add to Reading List

Source URL: stewin.org

Language: English - Date: 2012-03-27 11:15:56
UPDATE