Secure Computing

Results: 5296



#Item
251Computing / Cryptography / Secure communication / Security / Internet privacy / Crypto-anarchism / Mix network / Traffic analysis / Mixminion / Anonymous remailer / Denial-of-service attack / Len Sassaman

Heartbeat Traffic to Counter (n-1) Attacks Red-Green-Black Mixes George Danezis Anonymizer, IncMission Center Road, PMB 426

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:48:57
252

Real and Virtual Spaces Nicholas F. Polys, Ph.D. Advanced Research Computing Peter Sforza Center for Geospatial Information Technology

Add to Reading List

Source URL: secure.hosting.vt.edu

Language: English - Date: 2016-02-23 13:53:46
    253Computing / Security / Cyberwarfare / Computer security / Computer network security / Crime prevention / National security / Secure communication / Threat Stack / Threat / Cloud computing security / Cloud computing

    T HR E AT STACK + AMAZON IN SP ECTO R REA C H I NG CLO UD SEC U RI T Y IN DE P TH & SC A L E Achieve Stronger Security in the Cloud

    Add to Reading List

    Source URL: www.threatstack.com

    Language: English - Date: 2016-03-16 05:52:51
    254Cryptography / Computing / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / E-commerce / Keystore / Java Platform /  Enterprise Edition / Application server / Certificate authority / Java Secure Socket Extension

    J2EE Security for Servlets, EJBs and Web services Pankaj Kumar Software Architect, HP Date: March 28, 2003

    Add to Reading List

    Source URL: pankaj-k.net

    Language: English - Date: 2007-02-02 01:42:32
    255Teleconferencing / Computer-mediated communication / Videotelephony / Groupware / Technology / Educational technology / Computing / Assistive technology / Web conferencing / Videoconferencing / Telecommuting / Computer-supported collaboration

    White Paper GOVERNMENT AGENCIES SEEK SECURE, H I G H - P E R F O R M A N C E W E B C O L L A B O R AT I O N How to Manage the Risks and Opportunities of Networked Conferencing, Meetings and Training

    Add to Reading List

    Source URL: www.ilinc.com

    Language: English - Date: 2012-05-14 19:31:17
    256Computing / Security / Cyberwarfare / Computer security / Computer network security / Crime prevention / National security / Secure communication / Threat Stack / Threat / Cloud computing security / Cloud computing

    T HR E AT STACK + AMAZON IN SP ECTO R REA C H I NG CLO UD SEC U RI T Y IN DE P TH & SC A L E Achieve Stronger Security in the Cloud

    Add to Reading List

    Source URL: www.threatstack.com

    Language: English - Date: 2016-02-17 08:56:28
    257Digital rights management / Copyright law / Cryptography / Computer security / Cryptography law / Analog hole / Trusted Computing / Secure Digital Music Initiative / Digital watermarking / OMA DRM / Direct Rendering Manager

    WORKING DRAFT Privacy-DRM: Data Protection by Copy Protection ? Rainer Böhme1 and Andreas Pfitzmann ✝2, Technische Universität Dresden, Germany Abstract

    Add to Reading List

    Source URL: informationsecurity.uibk.ac.at

    Language: English - Date: 2016-04-12 07:21:29
    258Computing / Email / Cyberspace / Internet privacy / Secure communication / Opportunistic TLS / Transport Layer Security / Simple Mail Transfer Protocol / Extended SMTP / Email encryption / Opportunistic encryption / Gmail

    Uncovering Cryptographic Failures 
 with Internet-Wide Measurement Zakir Durumeric University of Michigan

    Add to Reading List

    Source URL: zakird.com

    Language: English
    259Free software / Computing / Software / Apache Software Foundation / Hadoop / Cloud infrastructure / ApacheCon / Apache Hadoop / Puppet / OpenLDAP / Apache ZooKeeper / Apache Oozie

    How to Deploy a Secure, Highly-Available Hadoop Platform Dr. Olaf Flebbe, Michael Weiser science + computing ag IT-Dienstleistungen und Software für anspruchsvolle Rechnernetze

    Add to Reading List

    Source URL: events.linuxfoundation.org

    Language: English - Date: 2015-09-24 13:05:39
    260Computing / Software / System software / Scripting languages / Cat / Redirection / Bash / Chmod / Path / Find / Make / Paste

    BlueCrystal Reference Card Advanced Computer Research Centre https://www.acrc.bris.ac.uk/ Logging In ssh Secure shell.

    Add to Reading List

    Source URL: www.acrc.bris.ac.uk

    Language: English - Date: 2015-10-12 09:19:00
    UPDATE