Secure Computing

Results: 5296



#Item
181Cryptography / Computing / Security / Public key infrastructure / Privacy of telecommunications / E-commerce / Secure communication / Lavabit / Email encryption / Transport Layer Security / Public-key cryptography / Encryption

Appeal: Doc: 37-1 Filed:

Add to Reading List

Source URL: www.aclu.org

Language: English - Date: 2015-04-10 18:25:21
182Computing / Network architecture / Internet / Network performance / Cryptographic protocols / Secure communication / Internet protocols / Flow control / Transmission Control Protocol / Transport Layer Security / TCP congestion control / HTTPS

HEIST: HTTP Encrypted Information can be Stolen through TCP-windows Mathy Vanhoef and Tom Van Goethem iMinds-DistriNet -

Add to Reading List

Source URL: tom.vg

Language: English - Date: 2016-08-03 21:35:58
183Computing / Software engineering / Software / Web development / World Wide Web / Ajax / User interface techniques / Cross-platform software / Web application / Java / Form / Push technology

Secure Web Applications via Automatic Partitioning Stephen Chong Jed Liu Andrew C. Myers Xin Qi K. Vikram Lantian Zheng Xin Zheng Department of Computer Science Cornell University {schong,liujed,andru,qixin,kvikram,zlt,x

Add to Reading List

Source URL: www.sosp2007.org

Language: English - Date: 2016-06-15 13:09:51
184Security / Computing / Computer security / Computer network security / Cryptography / Cyberwarfare / National security / Secure communication / Layered security / Mobile device management / Mobile workspace

Taking a Layered Approach to Securing Mobile Devices in the Enterprise When it comes to protecting enterprise data on mobile devices—whether it’s a phone, tablet or a laptop— you need to have layers of security in

Add to Reading List

Source URL: essentials.code42.com

Language: English - Date: 2016-07-16 06:38:47
185Computer hardware / Computer data storage / Computing / Non-volatile memory / Computer storage devices / Computer storage media / Solid-state drive / NVM Express / Computer memory / OCZ / Serial ATA / SCSI

Command Line Online Update Tool (CLOUT) User Guide CLOUT enables you to manage your SSDs using a command line, including for example, updating firmware and the BIOS, secure erasing data from your SSD, making the data unr

Add to Reading List

Source URL: ocz.com

Language: English
186Wireless sensor network / Wireless networking / Computing / Technology / Sensor node / Secure data aggregation in WSN

4. Secure Hierarchical Data Aggregation in Wireless Sensor Networks Data aggregation is a technique used to conserve battery power in wireless sensor networks (WSN). When securing such a network, it is important that we

Add to Reading List

Source URL: isc.mst.edu

Language: English - Date: 2014-01-22 05:22:51
187Computing / Computer hardware / System software / Computer file / Inter-process communication / File Explorer / DAISY Digital Talking Book / USB / Secure Digital / Features new to Windows Vista / Features new to Windows XP

Book Port Plus Finding Existing Titles and Sending New Content Presented by Maria E. Delgado The Title key

Add to Reading List

Source URL: www.aph.org

Language: English - Date: 2016-01-11 10:18:36
188Software engineering / Computing / Computer programming / Ada / GNAT / SPARK / Conference on Human Factors in Computing Systems

SIGAda 2009 Advance Program ACM Annual International Conference on Ada and Related Technologies: Engineering Safe, Secure, and Reliable Software Hilton St. Petersburg Bayfront Hotel

Add to Reading List

Source URL: www.sigada.org

Language: English - Date: 2009-08-29 19:28:08
189Wireless sensor network / Wireless networking / Computing / Technology / Data transmission / Sensor node / Energy harvesting / Internet of things / Energy development / ANT / Body area network / Secure data aggregation in WSN

Energy Neutral Operation: An energy efficient methodology for wireless sensor networks Pamela Bezerra Julie McCann

Add to Reading List

Source URL: womencourage.acm.org

Language: English - Date: 2016-08-09 09:14:03
190Security / Computing / Computer security / Crime prevention / Cryptography / Information governance / National security / Application security / Cross-site request forgery / Vulnerability / Information security / SQL injection

#1 GLOBAL PAYMENTS COMPANY OPTIMIZES SECURE DEVELOPMENT PROCESS WITH PREVOTY Trusted payments provider with deeply embedded secure development culture partners with Prevoty for standardized, real-time application protect

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36
UPDATE