Secure Computing

Results: 5296



#Item
91Computing / Cyberwarfare / Computer security / Computer network security / E-commerce / Secure communication / Web application security / Automated threat / OWASP / Vulnerability / Application security / Denial-of-service attack

............................................................... .............................................................. ............................................................... .............................

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-10-23 12:02:35
92Computing / Internet / Secure communication / Network architecture / Information science / Knowledge representation / Technical communication / Tor / Ontology / HTTPS / Internet privacy

Representing Network Trust and Using It to Improve Anonymous Communication? Aaron D. Jaggard1 , Aaron Johnson1 , Paul Syverson1 , and Joan Feigenbaum2 1 U.S. Naval Research Laboratory

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2014-06-03 06:13:52
93Software / Free software / Computing / Cross-platform software / MySQL / PHP / Sphinx / Apache HTTP Server / Windows Server / MySQL Cluster / Comparison of wiki software

Bitrix24 Self-hosted Version Product Requirements Bitrix24 Self-hosted Version: Product Requirements Bitrix24 is a highly secure, turnkey intranet solution for small and medium-sized businesses designed for effective co

Add to Reading List

Source URL: www.bitrixsoft.com

Language: English - Date: 2016-03-18 11:20:49
94Computing / Microsoft / Ls / Email / Role-based access control / Zip / Counterpoint / Outlook.com

COUNTERPOINT/SOFT  SKULL  PERMISSIONS  REQUEST  FORM     If  you  are  using  an  excerpt  or  selection  from  one  of  our  books  you  must  secure  w

Add to Reading List

Source URL: www.counterpointpress.com

Language: English - Date: 2015-10-09 13:23:09
95Computing / File Transfer Protocol / FTP clients / Network architecture / Internet Standards / FTP Voyager / FTPS / Secure FTP / Comparison of FTP client software / Secure file transfer protocol / Managed file transfer / Draft:JSCAPE

ServU_Product_Logo_SWfamily.eps

Add to Reading List

Source URL: cdn.swcdn.net

Language: English - Date: 2016-08-17 10:19:00
96Inheritance / Probate / Real property law / Gmail / Secure Digital / Law / Computing / Software

Marche-aton genews Members Would you like to share your

Add to Reading List

Source URL: www.miegs.org

Language: English - Date: 2016-02-27 06:46:22
97Computing / Cryptography / Videotelephony / Computer-mediated communication / Teleconferencing / Cryptographic protocols / Secure communication / Web conferencing / Zoom Video Communications / Security Assertion Markup Language / Transport Layer Security / HTTPS

Security Guide Zoom Video Communications Inc. Zoom unifies cloud video conferencing, simple online meetings, group messaging, and a softwaredefined conference room solution into one easy-to-use platform. Zoom offers the

Add to Reading List

Source URL: d24cgw3uvb9a9h.cloudfront.net

Language: English - Date: 2016-08-08 05:14:20
98Computing / Internet / Internet Standards / Internet protocols / Network architecture / DNSSEC / Domain Name System Security Extensions / Key management / Public-key cryptography / Domain Name System / Hash table / Namespace

Design of a Secure and Decentralized Location Service for Agent Platforms B.J. Overeinder1 , M.A. Oey1 , R.J. Timmer1 , R. van Schouwen1 , E. Rozendaal2 , and F.M.T. Brazier1 1

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:09
99Computer security / Cryptography / Computing / Security / Trusted Platform Module / Data in use / Embedded system / Physical unclonable function / Trusted Computing / Software / Operating system / Key management

Secure Embedded Systems Michael Vai, David J. Whelihan, Benjamin R. Nahill, Daniil M. Utin, Sean R. O’Melia, and Roger I. Khazan Developers seek to seamlessly integrate cyber

Add to Reading List

Source URL: www.ll.mit.edu

Language: English - Date: 2016-07-12 15:07:52
100Computing / Software / Computer network security / E-commerce / Secure communication / Remote desktop / Internet security / CVSS / OpenVAS / Transport Layer Security / Remote Desktop Protocol / Internet Information Services

OpenVas Vulnerability Report HackerTarget.com OpenVas Vulnerability Report HackerTarget.com

Add to Reading List

Source URL: hackertarget.com

Language: English - Date: 2015-12-08 04:52:50
UPDATE