Protected computer

Results: 695



#Item
691Intel APIC Architecture / Control register / Interrupt descriptor table / X86-64 / Protected mode / X86 memory segmentation / Global Descriptor Table / INT / Interrupt flag / Computer architecture / Interrupts / X86 architecture

PDF Document

Add to Reading List

Source URL: download.intel.com

Language: English - Date: 2013-06-07 22:24:01
692Computer network security / Stream ciphers / Wireless networking / RC4 / Wired Equivalent Privacy / Related-key attack / Initialization vector / Wi-Fi Protected Access / Transmission Control Protocol / Cryptography / Cryptographic protocols / IEEE 802.11

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-09-16 14:46:25
693X86 architecture / CPUID / Protected mode / Hypervisor / Interrupt descriptor table / VMware / Hyper-V / Paravirtualization / Virtual machine interface / Computer architecture / Computing / System software

PDF Document

Add to Reading List

Source URL: vmware.com

Language: English
694Computer network security / Computing / Technology / IEEE 802.11 / Wired Equivalent Privacy / Wireless security / CCMP / Wi-Fi Protected Access / IEEE 802.1X / Cryptography / Wireless networking / Cryptographic protocols

PDF Document

Add to Reading List

Source URL: itffroc.org

Language: English - Date: 2010-06-02 19:36:03
695Criminal law / Extradition / Gary McKinnon / Protected computer / Crime / Cybercrime / Computer law / Law

PDF Document

Add to Reading List

Source URL: news.findlaw.com

Language: English
UPDATE