Secure Computing

Results: 5296



#Item
421Remote desktop / Virtual Network Computing / Secure Shell / Password / Single sign-on / Remote Desktop Services / Telnet / One-time password / Terminal server / Computing / System software / Software

ACCESS CONTROL, SESSION RECORDING AND SUPERVISION of privileged users INSIDER THREAT MANAGEMENT • ENHANCED SECURITY ACCESS MANAGEMENT TO CRITICAL RESOURCES

Add to Reading List

Source URL: www.wallix.com

Language: English - Date: 2014-06-19 11:01:11
422Computing / Network security / Electronic engineering / Technology / Cisco Career Certifications / Cisco Systems / Deep packet inspection / Videotelephony

Graduate Software Engineer – Secure Access and Mobility Group Location: Netanya, Israel Cisco is the worldwide leader in networking technologies that transforms how people live, work, play and learn with a very rich p

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2013-02-10 05:38:39
423Technology / Embedded Linux / Secure Digital / Comparison of Android devices / Comparison of tablet computers / Smartphones / Android devices / Computing

Microsoft Word - spec01.docx

Add to Reading List

Source URL: www.e-seek.com

Language: English - Date: 2011-11-29 17:11:01
424Email / Malware / Conficker / Email spam / Spam / Internet / Computing / Spamming

Int. Secure Systems Lab Vienna University of Technology Inspector Gadget Automated Extraction of Proprietary Gadgets from Malware Binaries

Add to Reading List

Source URL: oakland10.cs.virginia.edu

Language: English - Date: 2010-05-19 11:16:50
425Cryptographic protocols / Bitcoin / Peer-to-peer computing / Secure multi-party computation / Commitment scheme / Zero-knowledge proof / X Window System / PP / Homomorphic encryption / Cryptography / Software / Computing

How to Use Bitcoin to Incentivize Correct Computations Ranjit Kumaresan and Iddo Bentov Technion, Haifa, Israel {ranjit | idddo }@cs.technion.ac.il

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2014-09-01 09:06:37
426Computing / Protection Profile / Key management / Public-key cryptography / Common Criteria / Electronic signature / Evaluation Assurance Level / Public key certificate / Integrity / Computer security / Evaluation / Security

Protection profiles for secure signature creation device — Part 6: Extension for device with key import and trusted communication with signature creation application

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2014-02-14 05:40:12
427HTTP / HTTP Secure / Secure communication / Integrity / Plug-in / Technology / Computing / Cryptographic protocols / Software

GlassTube: A Lightweight Approach to Web Application Integrity Per A. Hallgren Daniel T. Mauritzson Andrei Sabelfeld Chalmers University of Technology, Gothenburg, Sweden

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:10
428Hewlett-Packard / Cluster computing / OpenVMS / Parallel computing / Apache HTTP Server / X Window System / PHP / MySQL / DEC Alpha / Software / Computing / Cross-platform software

CSWS_PHP for HP Secure Web Server

Add to Reading List

Source URL: h71000.www7.hp.com

Language: English - Date: 2010-10-29 16:42:43
429Cloud applications / Data synchronization / File hosting / Crime prevention / National security / Dropbox / Computer security / Data security / Computer file / Computing / Software / Cloud computing

Financial Services Use Case Secure, auditable file sharing everywhere it counts To grow and sustain profitability in an era of low interest rates and disruptive

Add to Reading List

Source URL: essentials.code42.com

Language: English - Date: 2015-07-18 14:40:29
430Documents / Technical communication / Secure Digital / Flash memory / Technology / Computing / Computer hardware / Components / Datasheet

PDF Document

Add to Reading List

Source URL: dl.linux-sunxi.org

Language: English - Date: 2014-08-22 04:53:30
UPDATE