Secure Computing

Results: 5296



#Item
101Smart cards / Computing / Security / Ubiquitous computing / Computer access control / ISO standards / HID Global / MIFARE / Card reader / Java Card OpenPlatform / Java Card / Access control

LOGICAL AND PHYSICAL ACCESS SOLUTIONS Crescendo® C1150 ƒƒ Higher security – Encryption and data signing protects data-at-rest and enables trusted secure communications. ƒƒ Supports Secure Identity Object™ (SIO)

Add to Reading List

Source URL: planc.biz

Language: English - Date: 2013-12-17 10:12:36
102Computing / Cryptography / Software engineering / Hypertext Transfer Protocol / Cryptographic protocols / Secure communication / E-commerce / Transmission Control Protocol / HTTPS / Password / HTTP cookie / OpenSSL

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
103Software / Computing / Technology / Mobile technology / Data synchronization / Cloud applications / Mobile computers / Mobile device management / Mobile workspace / Enterprise mobility management / SharePoint / Dropbox

SyncDog-Sentinel-secure_Mobile-Workspace-Datasheet_2016-0420.indd

Add to Reading List

Source URL: www.syncdog.com

Language: English - Date: 2016-07-26 12:58:39
104Computer hardware / Computing / Computer storage devices / USB / Microsoft Diagnostics / MSD / Secure Digital

www.naneos.ch Partector quick start guide Insert mSD-Card with contacts facing upwards into the partector till it snaps in

Add to Reading List

Source URL: www.naneos.ch

Language: English - Date: 2014-10-17 07:19:37
105Computing / Microsoft / Ls / Zip / Email / Role-based access control / Counterpoint / Outlook.com

COUNTERPOINT/SOFT SKULL PERMISSIONS REQUEST FORM If you are using an excerpt or selection from one of our books you must secure written permission. Please fill out our permissions request form and send by email to permi

Add to Reading List

Source URL: www.counterpointpress.com

Language: English - Date: 2015-10-09 13:23:11
106Microsoft / Computing / Cyberspace / Internet privacy / Email / Password / Security / Outlook.com / Secure messaging

A message for ESD and WorkSource partners The Employment Security Department is taking steps to increase the level of security relating to email messages that may include confidential or restricted data like social secu

Add to Reading List

Source URL: esdorchardstorage.blob.core.windows.net

Language: English - Date: 2016-01-06 19:25:11
107Computing / Internet / Cyberspace / World Wide Web / Dark web / Internet culture / Secure communication / Deep web / .onion / Darknet / Tor / HTTPS

SHINING A LIGHT ON THE DARK WEB AN IN TELLIAGG REPORT: 2016

Add to Reading List

Source URL: media.scmagazine.com

Language: English - Date: 2016-04-08 17:33:42
108Cryptography / Advanced Encryption Standard / X86 instructions / Rambus / Side-channel attack / AES instruction set / Cryptography Research / Masking / Technology / Computing

Microarchitectures Undo Software Security Measures • To implement secure algorithms, software based cryptography utilizes the ISA through instructions or cryptographic extensions.

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2015-08-21 02:18:30
109Computing / HCard / Microformats / Email / Fax / B38 / Technology / Equipment

COMBINED BOOK EXHIBIT® XXXXXXXXXXXXXXXXXXXXXX

Add to Reading List

Source URL: secure.combinedbook.com

Language: English - Date: 2016-03-16 15:40:45
110Computing / Software / System software / Hardware virtualization / X86 virtualization / Virtual machine / Hypervisor / Hardware-assisted virtualization / Virtualization / Multilevel security / VM / Protection ring

Layered Assurance Scheme for Multi-Core Architectures J. Alves-Foss, X. He and J. Song Center for Secure and Dependable Systems University of Idaho ,[xhhe,song3202]@vandals.uidaho.edu

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:30
UPDATE