Secure Computing

Results: 5296



#Item
231Cryptography / Cryptography standards / Cryptographic software / Computing / Bouncy Castle / Java Cryptography Extension / Advanced Encryption Standard / Cryptographic Module Validation Program / Data Encryption Standard / Java Secure Socket Extension / FIPS 140 / SHA-2

Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) User Guide Version: 0.1 Date: Legion of the Bouncy Castle Inc.

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2016-05-11 21:52:06
232Computing / Security / Computer security / National security / Crime prevention / Computer network security / Secure communication / Data security / Intel Security / Threat / Digital Guardian / Detica

R E P O RT R E P R I N T Is your sensitive data lurking on the ‘dark Web’? Digital Shadows knows GA R RETT BEKK ER

Add to Reading List

Source URL: info.digitalshadows.com

Language: English - Date: 2016-06-02 10:35:55
233Computing / World Wide Web / Digital media / Hypertext Transfer Protocol / Cryptographic protocols / Secure communication / Internet privacy / Alphabet Inc. / Google Analytics / HTTP cookie / Privacy policy / HTTPS

Microsoft Word - 1.10R state ver 1 - (Rev. AprilPrivacy Policy Statement for CFF.org - Approved by Peter Nagel then chan

Add to Reading List

Source URL: communityfirstfoundation.org

Language: English - Date: 2016-04-01 14:27:10
234Computing / Cryptography / Cryptographic protocols / Internet / Secure communication / Internet protocols / Cryptographic software / Internet Standards / Transport Layer Security / OpenSSL / GnuTLS / Cipher suite

Implementing TLS with Verified Cryptographic Security Karthikeyan Bhargavan ∗ 1 , C´edric Fournet † 2 , Markulf Kohlweiss ‡ 2 , Alfredo Pironti § 1 , and Pierre-Yves Strub ¶ 3 1

Add to Reading List

Source URL: mitls.org

Language: English - Date: 2016-01-06 06:14:04
235Computing / Digital media / Computer access control / Identity management systems / Identity management / Security Assertion Markup Language / Password / Email / Infrastructure optimization / Internet

Align Engage your employees with secure video. Ustream Align makes it easy to deliver town halls, trainings and departmental communications to employees everywhere.

Add to Reading List

Source URL: info.ustream.tv

Language: English - Date: 2016-06-04 02:23:00
236Computing / Information technology / Software / Records management / Backup software / Email / Code42 / Web hosting / Electronic discovery / Legal hold / Computer file / Backup

SOLUTION OVERVIEW Code42 CrashPlan: Enterprise Discovery The secure, reliable and automated solution for end-user ESI preservation

Add to Reading List

Source URL: essentials.code42.com

Language: English - Date: 2016-06-12 16:12:01
237Videotelephony / Computer-mediated communication / Teleconferencing / Technology / Web conferencing / Computing / Remote administration software / WebEx / Cisco Systems / Videoconferencing / Teleconference / Password

White Paper Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration This paper focuses on security information for Cisco WebEx Meeting Center, Cisco WebEx Training Center, Cisco WebEx Support Center, and

Add to Reading List

Source URL: www.webex.com

Language: English - Date: 2016-04-06 00:43:01
238Computing / Security / 107th United States Congress / Patriot Act / Cloud computing / Search engine optimization / Computer security

Customer Spotlight TM Patriot Technologies, Inc. provides secure, tailored hardware and software solutions to global customers. Patriot addresses all aspects of the technology

Add to Reading List

Source URL: www.contentmx.com

Language: English - Date: 2015-11-30 12:40:31
239Computing / Internet / Network architecture / Secure communication / Internet Standards / Internet security / Computer network security / Internet protocols / SoftEther VPN / Tor / HTTPS / Transport Layer Security

Examining How the Great Firewall Discovers Hidden Circumvention Servers Roya Ensafi David Fifield

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2015-09-25 08:38:52
240Cryptography / Computing / Security / E-commerce / Secure communication / Crime prevention / National security / DMARC / Public key certificate / Sunrise period / Medical privacy / Domain name

GENERAL CONTROLS SUPPORTING THE DOMAIN NAME REGISTRATION SERVICES SOC 3 Audit Report Independent Service Auditor’s Report on Controls Placed in Operation

Add to Reading List

Source URL: www.encirca.com

Language: English - Date: 2016-04-14 14:46:28
UPDATE