Secure Computing

Results: 5296



#Item
21Security / Computing / Benetech / Non-profit organizations based in California / E-commerce / Secure communication / Session / Computer security

Three Day Martus Training Plan Benetech Human Rights Program Day 1 Session 1: Introduction to Martus 1. Introductions

Add to Reading List

Source URL: www.martus.org

Language: English - Date: 2015-12-10 19:03:00
22Computing / Computer access control / Web standards / Cryptographic protocols / Remote procedure call / SOAP / Hypertext Transfer Protocol / Web services / Web Services Description Language / 3-D Secure / Security token / Authentication

Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

Add to Reading List

Source URL: systempay.cyberpluspaiement.com

Language: English - Date: 2015-12-16 04:48:58
23Computing / Technology / Internet / Cryptographic protocols / Secure communication / International Road Federation / Transport Layer Security / Web conferencing / IRF / World Wide Web / Geneva

Terms and Conditions – International Road Federation Last updated: September 2015 Booking policy IRF Events Event bookings submitted less than 48 hours before an IRF Geneva event cannot be guaranteed unless you receive

Add to Reading List

Source URL: www.irfnet.ch

Language: English - Date: 2015-09-25 10:16:11
24Computing / Java platform / Component-based software engineering / Distributed computing architecture / Internet protocols / Applet / Java / Tuple space / Hypertext Transfer Protocol

A Simple Methodology for Secure Object Sharing Daniel Perovich Leonardo Rodríguez Martín Varela <> <> <> Instituto de Computación Facultad de Ingeniería

Add to Reading List

Source URL: www.cnl.fi

Language: English - Date: 2011-03-31 06:34:25
25Internet privacy / World Wide Web / HTTP cookie / Google Analytics / Computer security / Cookie / Computing / Zombie cookie / Secure cookies

Storm_Print_Extension_Logo_RGB

Add to Reading List

Source URL: www.stormdigital.com

Language: English - Date: 2015-04-09 06:00:58
26Computer access control / Internet privacy / Hypertext Transfer Protocol / Computing / HTTP cookie / Computer security / World Wide Web / Login / Session / Cookie / Secure cookies / Zombie cookie

Inverclyde Council Cookie Usage Inverclyde Council does not store any personal or tracking information on your computer via its web site. We use only the cookies detailed below which are deemed essential to the functiona

Add to Reading List

Source URL: www.inverclyde.gov.uk

Language: English
27Computer network security / Computing / Security / Videotelephony / Cyberwarfare / Internet privacy / Network architecture / Secure communication / Videoconferencing / Virtual private network / Endpoint / Computer security

NARBHAnet Documentation of Security Measures for Clinical Videoconferencing Connections This form is required as written documentation that security measures are in place for all videoconference endpoints and connections

Add to Reading List

Source URL: www.rbha.net

Language: English - Date: 2013-04-11 02:24:06
28Security / Cryptography / Computing / Prevention / Data security / Secure communication / Crime prevention / National security / Key management / Computer security / Data breach / SafeNet

For more information, please visit: 1 www.securethebreach.com

Add to Reading List

Source URL: breachlevelindex.com

Language: English - Date: 2016-08-03 15:31:24
29Software / Computing / Remote desktop / System software / X Window System / Virtual Network Computing / Thin client / Password / Computer security / GO-Global / Security and safety features new to Windows Vista

Secure Mobile Computing via Public Terminals Richard Sharp1 , James Scott1 and Alastair R. Beresford2 1 Intel Research, 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK

Add to Reading List

Source URL: rich.recoil.org

Language: English - Date: 2006-05-23 08:53:35
30Software / Computing / Cybercrime / Web browsers / Embedded Linux / Freeware / Portable software / Phishing / HTTP cookie / Opera / Computer security / Web browsing history

Int. Secure Systems Lab Vienna University of Technology A Practical Attack to De­Anonymize Social  Network Users

Add to Reading List

Source URL: oakland31.cs.virginia.edu

Language: English - Date: 2010-05-22 10:36:07
UPDATE