Secure Computing

Results: 5296



#Item
31Videotelephony / Computer-mediated communication / Teleconferencing / Technology / Web conferencing / Computing / Remote administration software / WebEx / Cisco Systems / Videoconferencing / Teleconference / Password

White Paper Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration This paper focuses on security information for Cisco WebEx Meeting Centre, Cisco WebEx Training Centre, Cisco WebEx Support Centre and C

Add to Reading List

Source URL: www.webex.co.uk

Language: English - Date: 2016-04-06 00:10:51
32Security / Secure communication / Data security / Computing / Data breach / Identity theft / Computer security / SafeNet / Medical data breach / Personal Data Privacy and Security Act

BREACH LEVEL INDEX ANNUAL RECAPTOP BREACHES BY TYPE

Add to Reading List

Source URL: www.breachlevelindex.com

Language: English - Date: 2016-08-03 15:31:24
33Computing / Free software / Cloud computing / Cloud storage / OwnCloud / Nextcloud

ownCloud Announces Industry’s First Federated Universal File Access Platform With File Protection ownCloud 9.0 Enterprise Edition provides secure file access across data silos with improved document classification,

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2016-04-14 02:52:46
34Software / Food and drink / Computing / Social networking services / Parking / Tapa / F-Secure / Computer security / Social media / Foursquare / Tapa /  Estonia

Decembervigilant THE MONTHLY CARGO CRIME UPDATE FOR MEMBERS OF TAPA EMEA A YEAR OF NON-STOP

Add to Reading List

Source URL: www.tapaemea.org

Language: English - Date: 2014-12-22 06:36:14
35Computing / Cloud computing / Cloud infrastructure / Cloud storage / Cloud computing security / Computer security / OpenStack / Crypto cloud computing / Cloud computing issues

Secure and Resilient Cloud Computing for the Department of Defense Nabil A. Schear, Patrick T. Cable, Robert K. Cunningham, Vijay N. Gadepally, Thomas M. Moyer, and Arkady B. Yerukhimovich

Add to Reading List

Source URL: www.ll.mit.edu

Language: English - Date: 2016-07-12 15:09:52
36Single-board computers / Computing / Classes of computers / Microcontrollers / Computer architecture / Linux-based devices / ARM architecture / Wireless networking / Secure Digital / Wi-Fi / Banana Pi / ESP8266

PDF Document

Add to Reading List

Source URL: airstash.com

Language: English
37Software testing / Computer security / Computing / Software engineering / Codenomicon / Fuzz testing / Oulu University Secure Programming Group / Denial-of-service attack / Test automation / Security testing / American fuzzy lop / Fault injection

Fuzzing Fuzzing: A Solution Chosen by the FDA to Investigate Detection of Software Vulnerabilities

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-07-06 08:58:36
38Framework Programmes for Research and Technological Development / Innovation / Musa Dagh / Cloud computing / Science and technology

MUSA: Multicloud Secure Applications Massimiliano Rak, CerICT/Second University of Naples Dissemination Leader

Add to Reading List

Source URL: cf2015.holacloud.eu

Language: English - Date: 2015-10-12 10:18:36
39Cryptography / Computing / Hypertext Transfer Protocol / Key management / Cryptographic protocols / Secure communication / HTTP cookie / Transport Layer Security / Public-key cryptography / Encryption / Key / Session

Robert L. Bogue MS MVP, MCSE, MCSA:SecurityPerformance Improvement:

Add to Reading List

Source URL: www.thorprojects.com

Language: English - Date: 2015-07-23 13:05:22
40Engineering / Computing / Security engineering / Robert C. Seacord / Secure coding / Computer programming / Vulnerability / Security Patterns / Software engineering / Cyberwarfare / Software development / Grady Booch

Microsoft Word - review18.doc

Add to Reading List

Source URL: www.jot.fm

Language: English - Date: 2007-08-10 10:58:07
UPDATE