Secure Computing

Results: 5296



#Item
191Computing / Computer security / Cyberwarfare / Hacking / Computer network security / Software testing / Vulnerability / OWASP / Secure coding / Application security / Cross-site scripting / Defensive programming

Combating the Top 4 Sources of Software Vulnerabilities

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2016-07-20 15:52:45
192Computing / Online databases / Security / University of Essex / Data / Data management / UK Data Archive / Secure communication / E-commerce / Data security / Computer security / High-performance Integrated Virtual Environment

ESRC Secure Data Service A new vision for secure data access Melanie Wright, Director Secure Data Service UK Data Archive

Add to Reading List

Source URL: www.scot-ship.ac.uk

Language: English - Date: 2014-04-01 08:14:46
193Instruction set architectures / Reduced instruction set computing / RISC-V / Instruction set / ARM architecture / Comparison of instruction set architectures

Secure AES Implementation on a 32-bit RISC-V Processor Advisor(s): Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2016-02-24 05:00:01
194Database / Relational database management systems / Cloud computing / Cloud infrastructure / Agile software development / NoSQL / Microsoft Azure / SQL Azure

Database Migration Keep your databases always up-to-date and secure by migrating on-prem databases to the cloud BitTitan Database Migration is a push-button migration tool for easily migrating on-premises relational da

Add to Reading List

Source URL: s3-us-west-2.amazonaws.com

Language: English - Date: 2016-06-13 13:43:47
195Computer network security / Layer 2 Tunneling Protocol / Ethernet / DMZ / Virtual private network / Network switch / Light-emitting diode / Cisco PIX

Secure Computing SG User Manual Secure Computing 4810 Harwood Road San Jose, CA

Add to Reading List

Source URL: go.mcafee.com

Language: English - Date: 2006-03-14 00:54:01
196Email / Outlook.com / Cloud computing / Database / Message transfer agent

MDA PROPERTY MANAGER© CLOUD MIGRATION ORDER FORM Please complete the details below and return it to the consultant you have been dealing with to secure your migration date. COMPANY DETAILS COMPANY NAME

Add to Reading List

Source URL: www.mdapropsys.com

Language: English - Date: 2016-08-01 09:48:09
197Reconfigurable computing / Fabless semiconductor companies / Field-programmable gate array / Disk encryption / Xilinx / Altera / Virtex / Bitstream / Data Encryption Standard / Galois/Counter Mode / Encryption / BitLocker

Compact and On-the-Fly Secure Dynamic Reconfiguration for Volatile FPGAs HIRAK KASHYAP and RICARDO CHAVES, INESC-ID, IST, Universidade de Lisboa The dynamic partial reconfiguration functionality of FPGAs can be attacked,

Add to Reading List

Source URL: www.inesc-id.pt

Language: English - Date: 2016-02-23 14:14:05
198Cryptography / Computer network security / Computer security / Cyberwarfare / National security / Secure communication / Application security / Communications security / Wireless security / Software-defined radio / Advanced Learning and Research Institute / Software security assurance

NRL BAA Announcement # HIGH ASSURANCE ENGINEERING AND COMPUTING The Center for High Assurance Computer Systems of the Naval Research Laboratory (NRL) is seeking white papers for innovative research, advanced sys

Add to Reading List

Source URL: heron.nrl.navy.mil

Language: English - Date: 2016-02-17 10:17:54
199United States patent law / Markman hearing / Patent infringement / Finjan /  Inc. v. Secure Computing Corp.

1 2 3 UNITED STATES DISTRICT COURT

Add to Reading List

Source URL: www.ipo.org

Language: English - Date: 2016-07-20 09:18:07
200Renaissance Computing Institute / Board of directors

iRODS Consortium - Bylaws Version: Nov 30 2015 1 Terminology iRODS - integrated Rule-Oriented Data System, data management software that associates data with metadata and implements automated workflows, secure collabo

Add to Reading List

Source URL: irods.org

Language: English - Date: 2016-03-04 15:11:50
UPDATE