Messaging security

Results: 466



#Item
51Computing / Alberta Electric System Operator / Key management / Cryptographic protocols / Public key certificate / HTTP Secure / Email / Uniform resource identifier / Adams / URI schemes / Internet / Public-key cryptography

May 6, 2010 To: Market Participants and Other Interested Parties Re: Security certificate and new URL for the Automated Dispatch and Messaging System (ADaMS) On Tuesday, June 1, 2010, the Alberta Electric System Operato

Add to Reading List

Source URL: www.aeso.ca

Language: English - Date: 2010-05-06 18:59:24
52Computer network security / Proprietary software / Instant messaging clients / ICQ / Danville Community College / Norton AntiVirus / WeatherBug / Application software / AOL Instant Messenger / Software / AOL / Antivirus software

Technology Standard PURPOSE The Information Technology Department at Danville Community College has some computing guidelines that employees should be aware of. Following, are some policies and guidelines specific to se

Add to Reading List

Source URL: www.dcc.vccs.edu

Language: English - Date: 2009-02-16 10:47:08
53Electronic commerce / Cryptographic protocols / Secure messaging / Certificate authority / Transport Layer Security / Public key certificate / Cryptographic hash function / Public key fingerprint / Man-in-the-middle attack / Cryptography / Public-key cryptography / Key management

Bringing Deployable Key Transparency to End Users Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman Princeton University Abstract Despite its critical importance, secure key veri

Add to Reading List

Source URL: www.jbonneau.com

Language: English - Date: 2015-04-10 15:07:29
54Spamming / Botnets / Denial-of-service attacks / Internet Relay Chat / Android Cloud to Device Messaging Service / Denial-of-service attack / Push technology / Malware / Windows Mobile / Computing / Computer network security / Multi-agent systems

Cloud-based Push-Styled Mobile Botnets: A Case Study of Exploiting the Cloud to Device Messaging Service Shuang Zhao Patrick P.C. Lee John C.S. Lui Xiaohong Guan Xiaobo Ma Jing Tao

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2012-08-15 23:52:07
55Email / Computer security / Acceptable use policy / Instant messaging / Bourke v. Nissan Motor Co. / Data discrimination / Computing / Internet / Digital media

ADMINISTRATIVE POLICIES AND PROCEDURES State of Tennessee Department of Correction Index #: 109.05

Add to Reading List

Source URL: tn.gov

Language: English - Date: 2015-04-30 16:14:19
56Computer network security / Cross-platform software / Portable software / Deep packet inspection / Communications protocol / Voice over IP / Extensible Messaging and Presence Protocol / Internet protocol suite / Skype / Software / Computing / Videotelephony

Product Datasheet Protocol and Application Plugin Library Qosmos ixEngine® is the most complete DPI engine on the market, with the ability to identify all major protocols and applications circulating on fixed and mobil

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-03-31 11:09:09
57Computer network security / Cyberwarfare / Computing / Data management / Data security / Secure messaging / Internet privacy / Disk encryption / Public-key cryptography

Security Overview Where is my data stored? eSalesTrack applications and data reside on a highly secure network of servers managed and maintained by Soleran, eSalesTrack’s parent company. Soleran utilizes the latest har

Add to Reading List

Source URL: www.esalestrack.com

Language: English - Date: 2014-12-15 19:54:19
58Skype / Videotelephony / Instant messaging / Features of Skype / Skype security / Software / Computer-mediated communication / Computing

Nusoft Newsletter – IR Series No.21 Tech Overview : Recording Skype Voice Conversations Using the Internet for voice communication services is becoming increasingly widespread. One

Add to Reading List

Source URL: www.nusoft.com.tw

Language: English - Date: 2012-10-23 00:46:26
59Network architecture / Electronics / Internet privacy / Online chat / Internet / New media / Peer-to-peer / Virtual private network / Instant messaging / Computing / Digital media / Computer network security

Nusoft Newsletter – IR Series No.28 Tech Overview : Advanced Authentication Management for IT Administrators

Add to Reading List

Source URL: www.nusoft.com.tw

Language: English - Date: 2012-10-23 00:46:27
60Online chat / Computer-mediated communication / Internet protocols / Transport Layer Security / Presence information / XML namespace / BOSH / Computing / Cross-platform software / Extensible Messaging and Presence Protocol

XEP-0198: Stream Management Justin Karneges mailto: xmpp: Peter Saint-Andre

Add to Reading List

Source URL: xmpp.org

Language: English - Date: 2014-04-08 13:16:44
UPDATE