Messaging Security

Results: 466



#Item
151Technology / Online chat / Good Technology / Mobile software / IBM Lotus Domino / Microsoft Exchange Server / Instant messaging / Provisioning / Vision Mobile Browser / Computing / Software / Groupware

COMPANY CONFIDENTIAL SECURITY TARGET FOR GOOD FOR ENTERPRISE SYSTEM, V1.19

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-09-19 06:43:37
152Centrelink / Government / Welfare / United States federal budget / Instant messaging / Cheque / Business / American Recovery and Reinvestment Act / Social security / Australia / Taxation in the United States

In this issue: Insecure Work Enquiry..Page 3 Lorraine Johnson……Page 4 Contact us…………………..Page 4 Income Management Comes to Victoria

Add to Reading List

Source URL: www.ssrv.org.au

Language: English - Date: 2013-02-18 01:39:13
153Electronics / Cisco Systems / Unified communications / Voice-mail / Network security / Instant messaging / Cisco Unified Communications Manager / Session border controller / Videotelephony / Electronic engineering / Computer-mediated communication

Cisco Smart Business Communications System Brochure

Add to Reading List

Source URL: www.lvsimplyit.com

Language: English - Date: 2014-12-29 10:40:19
154Internet protocols / Extensible Messaging and Presence Protocol / Online chat / XMPP Standards Foundation / Transport Layer Security / Zlib / URI scheme / XML / Uniform resource identifier / Computing / OSI protocols / Instant messaging

XEP-0138: Stream Compression Joe Hildebrand mailto:[removed] xmpp:[removed] Peter Saint-Andre

Add to Reading List

Source URL: xmpp.org

Language: English - Date: 2014-04-08 13:07:27
155Data / Simple Mail Transfer Protocol / Communications protocol / Message transfer agent / SOAP / Transport layer / Instant messaging / Port / SMS / Computing / Email / Computer-mediated communication

Email: the Cinderella protocol? Graham Klyne Head of Strategic Research Content Security Group (This presentation has additional detail in the notes page view)

Add to Reading List

Source URL: www.ninebynine.org

Language: English - Date: 2014-07-07 12:00:30
156Computer-mediated communication / Computer network security / Computing / Internet / TrustedSource / Messaging Security / Email / CipherTrust / Spamming

Microsoft Word - 6.1_Edge_Datasheet_020706.doc

Add to Reading List

Source URL: www.openaccess.co.uk

Language: English - Date: 2008-02-20 05:18:13
157Computer-mediated communication / Computer network security / Spam filtering / Spamming / Anti-spam / CipherTrust / Messaging Security / Spam / Extended SMTP / Computing / Email / Internet

“The IronMail appliance is easy to set up, delivers great performance, IronMail and offers very sophisticated

Add to Reading List

Source URL: www.openaccess.co.uk

Language: English - Date: 2008-02-20 05:19:02
158Internet / Webmail / Secure messaging / Email client / EmailTray / Email / Computer-mediated communication / Computing

IT SECURITY GURU PRODUCT REVIEW AppRiver CipherPost Pro Supplier: AppRiver Product: AppRiver cipherpost pro Website: www.appriver.com Price: £6.80 per user ex VAT

Add to Reading List

Source URL: www.appriver.com

Language: English - Date: 2014-09-10 09:34:40
159Government / Disaster preparedness / Humanitarian aid / Occupational safety and health / Certified first responder / Federal Emergency Management Agency / United States Department of Homeland Security / Text messaging / Public safety / Emergency management / Emergency medical responders

Supporting Team Coordination on the Ground: Requirements from a Mixed-Reality Game Joel E. Fischer, Wenchao Jiang, Andruid Kerne*, Chris Greenhalgh, Sarvapali D. Ramchurn+, Steven Reece~, Nadia Pantidi and Tom Rodden The

Add to Reading List

Source URL: ecologylab.net

Language: English - Date: 2014-04-08 13:23:01
160Mobile technology / Cloud standards / OAuth / Android software / Geosocial networking / Twitter / Foursquare / Application programming interface / SMS / Technology / Computing / Text messaging

Security Research of a Social Payment App Ben Kraft, Eric Mannes, Jordan Moldow 14 May 2014 Sections 1.3, 5 added 7 July 2014 Abstract We have performed a security audit of Venmo, a social payments application. We

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English
UPDATE