Protected computer

Results: 695



#Item
221Global Descriptor Table / Local Descriptor Table / Protected mode / X86 memory segmentation / Task state segment / Call gate / Memory protection / Segment descriptor / Context switch / Computer architecture / X86 architecture / Memory management

GDT and LDT in Windows kernel vulnerability exploitation Matthew “j00ru” Jurczyk and Gynvael Coldwind, Hispasec Abstract

Add to Reading List

Source URL: vexillium.org

Language: English
222Cryptographic protocols / IEEE 802.11 / Computing / Cyberwarfare / Key management / Wireless security / Wi-Fi Protected Access / Wired Equivalent Privacy / IEEE 802.11i-2004 / Cryptography / Computer network security / Wireless networking

Configuring DMS Central Control Software to Communicate with VMS Signs Using the PortServer® TS H MEI Serial Server

Add to Reading List

Source URL: ftp1.digi.com

Language: English - Date: 2009-02-03 11:41:40
223Supervisor / Management / Computer network security / Protected Extensible Authentication Protocol / Extensible Authentication Protocol / Occupational safety and health / Employee assistance program / Employment compensation

July Strong EAP-Supervisory.indd

Add to Reading List

Source URL: www.urmc.rochester.edu

Language: English - Date: 2014-07-10 11:28:23
224Computing / Computer security / Database / Cyberwarfare / Vulnerability / Treasury Inspector General for Tax Administration / Internal Revenue Service / Oracle Corporation / Database management systems / Taxation in the United States / Database security

Security Over Databases Could Be Enhanced to Ensure Taxpayer Data Are Protected

Add to Reading List

Source URL: www.treasury.gov

Language: English - Date: 2011-06-23 08:11:55
225Video signal / Television / Video formats / High-definition television / Computer display standards / Audio and video connector / VGA connector / Composite video / Digital Visual Interface / Computer hardware / Television technology / Electronic engineering

RX-W32 A large-format, featured-packed 32” widescreen display protected by NeoVTM Optical Glass and a durable metal frame for serious security environments.

Add to Reading List

Source URL: www.surveillance-video.com

Language: English - Date: 2014-02-21 12:38:08
226Law / Health / Protected health information / Privacy / Health informatics / Computer security / Data privacy / Privacy law / Health Insurance Portability and Accountability Act

www.BeaconPediatrics.net Authorization to Disclose Protected Health Information BY SIGNING I HEREBY AUTHORIZE: TO RELEASE THE FOLLOWING INFORMATION TO:

Add to Reading List

Source URL: www.beaconpediatrics.net

Language: English - Date: 2013-09-25 22:48:31
227Privacy / Health Insurance Portability and Accountability Act / Computer law / Computer security / Information privacy / Medical record / Authorization / Protected health information / Privacy law / Data privacy / Law

2111 Exchange Street Astoria, Oregon[removed]Tel: [removed]Fax: [removed]GENERAL OR PSYCHOTHERAPY NOTE AUTHORIZATION

Add to Reading List

Source URL: www.netreturns.biz

Language: English - Date: 2014-02-20 13:51:22
228Cryptography / IEEE 802.11 / Computing / Technology / Wireless security / Wi-Fi Protected Access / Extensible Authentication Protocol / IEEE 802.11i-2004 / Wired Equivalent Privacy / Cryptographic protocols / Computer network security / Wireless networking

WiFi Protected Access (WPA) Overview - 9 Windows Platform Design Notes Design Information for the Microsoft® Windows® Family of Operating Systems WiFi Protected Access (WPA) Overview

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2005-07-07 14:59:26
229Protected Extensible Authentication Protocol / Technology / Wi-Fi / Password / Telecommunications engineering / Comparison of wireless LAN clients / Extensible Authentication Protocol / Wireless networking / Computer network security / Computing

Configuring WIT‐SECURE Using Windows XP    This guide is intended for anyone who is using the Windows XP wireless manager.  It includes  instructions for connecting to the WIT‐SECURE netw

Add to Reading List

Source URL: www.wit.edu

Language: English - Date: 2015-01-23 13:37:31
230Methodology / Intellectual property law / Computer law / Free software licenses / Patent law / Creative Commons license / License / Royalties / Copyright law of the United States / Law / Open content / Copyleft

Canada Millennium Scholarship Foundation Licence: Attribution, Non-commercial, ShareAlike THE WORK (AS DEFINED BELOW) IS PROVIDED UNDER THE TERMS OF THIS LICENSE ("LICENSE"). THE WORK IS PROTECTED BY COPYRIGHT AND/OR OTH

Add to Reading List

Source URL: qspace.library.queensu.ca

Language: English - Date: 2011-08-16 01:17:25
UPDATE