Secure Computing

Results: 5296



#Item
171Computing / Cloud infrastructure / Virtualization / Cloud computing / Data center / Desktop virtualization / Network virtualization

Distributed Technology Group (DTG) is dedicated to helping organizations develop and implement secure, productive and cost-effective IT strategies. By understanding your environment, your needs and barriers to success, D

Add to Reading List

Source URL: www.dtg.com

Language: English - Date: 2013-08-28 10:35:19
172Software / Computing / Computer architecture / Cloud clients / Personal computing / Smartphones / Mobile device management / Android / Uhuru Mobile / Signal / Tablet computer

A comprehensive secure mobility solution for Smartphones and Tablets

Add to Reading List

Source URL: www.uhuru-mobile.com

Language: English - Date: 2016-02-26 12:08:31
173Computing / Computer security / Cyberwarfare / Cryptographic protocols / Secure communication / Computer network security / Internet protocols / Computer access control / Cross-site scripting / Cheat sheet / Cross-site request forgery / Cheating in video games

OWASP Cheat Sheets Martin Woschek, April 9, 2015 Contents I

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-04-23 16:03:46
174Data mining / Formal sciences / Web mining / World Wide Web / Computing / Database / Secure multi-party computation / Communications protocol / Information science / Information technology / Theoretical computer science

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-03 07:39:24
175Computing / Remote desktop / Software / System software / Application server / Server / X Window System / Citrix Systems / Internet Relay Chat / Remote Desktop Services / Remote Desktop Protocol

USING THE COMMON CRITERIA IN PRACTICE Mike Nash Gamma Secure Systems Limited Camberley, UK

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2010-09-01 03:25:04
176Business continuity and disaster recovery / Backup / Data security / Cloud storage / Backup software / Computing / Online backup services / Business / Economy

CLIENT SUCCESS STORY WHEN CRITERIA FOR SUCCESS FOUND THEIR SERVER SITTING IN A POOL OF WATER THEY KNEW THEY NEEDED A BETTER WAY TO SECURE THEIR DATA Sales improvement consultancy turns to KeepItSafe to improve their own

Add to Reading List

Source URL: www.keepitsafej2.co.uk

Language: English - Date: 2016-08-18 06:15:35
177Computing / Network management / Information technology management / Artificial intelligence / Simple Network Management Protocol / System administration / Royal Institute of Technology / Autonomic computing / IEEE Communications Society / Secure Shell

Microsoft Word - NewsLetter#1_final.doc

Add to Reading List

Source URL: emanics.org

Language: English - Date: 2006-07-19 09:50:40
178Computing / Internet / E-commerce / Internet security / Secure communication / Transport Layer Security / Server / Network architecture

Jarrett & Lam Limited The Laurels, 75 Reigate Road, Hookwood, Surrey RH6 0HL www.jarrettandlam.com Terms and Conditions for operating Vacancy Lab on a cloud server or over the internet.

Add to Reading List

Source URL: www.vacancylab.com

Language: English - Date: 2015-12-18 09:30:09
179Identity management / Law / Privacy / Internet privacy / Medical privacy / Government / Politics / Computing / Do Not Track legislation / P3P

Pet Poison Helpline Privacy Policy We are committed to keeping all personal and medical information we have about consumers confidential and secure. This policy describes how we protect this privacy.

Add to Reading List

Source URL: 48qbc13dv397vzass1iql2a1.wpengine.netdna-cdn.com

Language: English - Date: 2016-02-16 15:33:15
180Computing / Network architecture / Internet protocols / Secure communication / World Wide Web / Computer networking / Transport Layer Security / QUIC / Proxy server / SPDY / HTTPS / Hypertext Transfer Protocol

The Cost of the “S” in HTTPS David Naylor? , Alessandro Finamore† , Ilias Leontiadis‡ , Yan Grunenberger‡ , Marco Mellia† , Maurizio Munafò† , Konstantina Papagiannaki‡ , and Peter Steenkiste? ? Carnegi

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:56:14
UPDATE