Secure Computing

Results: 5296



#Item
441Cloud storage / Data center / Data management / Distributed data storage / Networks / Voice over IP / TE Data / Computing / Concurrent computing / Distributed computing

Chappaqua \ OVERVIEW HIGHLIGHTS Secure, flexible, scalable

Add to Reading List

Source URL: www.vxchnge.com

Language: English - Date: 2015-05-01 14:45:03
442Computer security / Information technology / OWASP / Security / SAP AG / Application security / European Telecommunications Standards Institute / Web application security / Ambient intelligence / Computing / Computer network security / Technology

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2014-10-17 10:43:23
443Computing / Communications protocol / Yahalom / Needham–Schroeder protocol / Cryptographic protocols / Data / Information

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2014-10-17 10:40:00
444Out-of-band management / Serial port / Secure Digital / RS-232 / Split / ASCII / Microcontrollers / Technology / Computer hardware / Computing / Bowling

Daisy v1.4 Mayteuthis.com makezine.com

Add to Reading List

Source URL: www.teuthis.com

Language: English - Date: 2012-09-14 20:47:06
445Computing / Software testing / Electronic commerce / Hacking / SecurityMetrics / Penetration test / Vulnerability / Application security / Attack / Computer security / Cyberwarfare / Computer network security

SecurityMetrics Penetration Testing How do you really know if your sensitive data is secure? Even the best developers can accidentally miss secure coding steps, or fail to implement the latest secure coding practices.

Add to Reading List

Source URL: www.securitymetrics.com

Language: English - Date: 2015-07-14 12:51:45
446C++ / Data types / Memory management / Software bugs / Subroutines / Pointer / C dynamic memory allocation / Setjmp.h / Stack / Software engineering / Computing / Computer programming

Scrash: A System for Generating Secure Crash Information Pete Broadwell Matt Harren Naveen Sastry∗ University of California, Berkeley {pbwell, matth, nks}@cs.berkeley.edu Abstract

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:54
447Computing / Sensor web / Sensor node / Data logger / ANT / Data link layer / Wireless Nodes Database / Virtual sensor network / Secure Data Aggregation in WSN / Wireless sensor network / Technology / Wireless networking

Wireless Netw:1091–1108 DOIs11276Integration of wireless sensor networks in environmental monitoring cyber infrastructure Jue Yang Æ Chengyang Zhang Æ Xinrong Li Æ

Add to Reading List

Source URL: www.cse.unt.edu

Language: English - Date: 2013-08-06 17:07:56
448

Modeling Complexity in Secure Distributed Computing? Christian Cachin IBM Research, Zurich Research Laboratory CH-8803 R¨ uschlikon, Switzerland

Add to Reading List

Source URL: www.zurich.ibm.com

    449

    Secure Mobile Computing via Public Terminals Richard Sharp1 , James Scott1 and Alastair R. Beresford2 1 Intel Research, 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    - Date: 2006-05-23 08:53:35
      450

      Insight is a leading provider of a broad range of top name-brand IT computing products, software and advanced IT services helping companies around the world enable, manage and secure their IT environment. Located in majo

      Add to Reading List

      Source URL: s.nsit.com

      - Date: 2013-04-19 08:21:01
        UPDATE