Intel Security

Results: 436



#Item
81

Product Security Practices at Intel Security Intel Security Software / Product Security Practices May 14, 2015

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-05-14 19:26:02
    82

    2014 IEEE Security and Privacy Workshops Using Existing Hardware Services for Malware Detection. Sarat Kompalli, Intel Corporation

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2014-04-30 03:10:29
      83Cloud infrastructure / Trusted computing / Semiconductor companies / Server hardware / IBM cloud computing / Trusted Execution Technology / Intel / Trusted Computing Group / IBM System x / Cloud computing / Computing / Computer security

      Vendor Spotlight OCTOBER 2012 IBM Offers Cloud Security for a Smarter Planet

      Add to Reading List

      Source URL: www.intel.com

      Language: English - Date: 2015-01-09 15:28:45
      84Trusted computing / Virtual machines / Trusted Execution Technology / x86 architecture / Trusted Computing Group / Trusted Platform Module / Xen / Dell PowerEdge / Embedded hypervisor / System software / Computing / Software

      Cloud Design Uses Enomaly ECP* for Platform Security

      Add to Reading List

      Source URL: www.intel.com

      Language: English - Date: 2014-03-01 18:42:02
      85Intel / Security / Corporate social responsibility / Information security / Business / Business ethics / Applied ethics / Social responsibility

      Intel Code of Conduct JANUARY 2015 From Intel’s CEO

      Add to Reading List

      Source URL: www.intel.com.br

      Language: English - Date: 2015-02-05 07:04:13
      86Companies listed on the New York Stock Exchange / Intel / Computer hardware / Technology / Infrastructure optimization / Network security / Malware / McAfee VirusScan / McAfee / Antivirus software / Computing

      Corporate Fact Sheet About Intel Security Corporate Data Santa Clara, California United States

      Add to Reading List

      Source URL: www.mcafee.com

      Language: English - Date: 2015-05-22 16:42:19
      87Deep packet inspection / Virtual machines / Packet Processing / X86 virtualization / OpenFlow / Network intelligence / Hyper-V / Xen / System software / Software / Computer network security

      WHITE PAPER Intel® Architecture Processors Qosmos* DPI Technology Networking and Communications Service-Aware Network Architecture Based on

      Add to Reading List

      Source URL: www.qosmos.com

      Language: English - Date: 2015-03-31 11:07:48
      88Streaming / Computer network security / Network architecture / Electronic engineering / Deep packet inspection / Policy charging and rules function / Traffic shaping / Quality of service / Traffic flow / Computing / Telecommunications engineering / Network performance

      Application Note Intel® Architecture Processors Qosmos* DPI Technology Policy Enforcement in SDN and NFV- based Telco Infrastructure

      Add to Reading List

      Source URL: www.qosmos.com

      Language: English - Date: 2015-03-31 11:07:29
      89Cyberwarfare / Symantec / Check Point / Network security / Information security / Internet security / Managed security service / Wireless security / Intel / Computer network security / Computer security / Computing

      Security Report December 30, 2002 IT Security Sector Monthly Report December 2002

      Add to Reading List

      Source URL: signalhill.in

      Language: English - Date: 2013-09-25 15:28:43
      90Cloud storage / File hosting / Data security / Web services / Backup / Amazon S3 / Public-key cryptography / Key management / Database / Computing / Network file systems / Cloud computing

      FADE: Secure Overlay Cloud Storage with File Assured Deletion Yang Tang† , Patrick P. C. Lee† , John C. S. Lui† , and Radia Perlman‡ † The Chinese University of Hong Kong ‡ Intel Labs

      Add to Reading List

      Source URL: www.cs.cuhk.hk

      Language: English - Date: 2010-10-18 05:22:07
      UPDATE