Secure Computing

Results: 5296



#Item
451

Institute for Enterprise Computing SeDiCo – Towards a Framework for a Secure and Distributed Cloud Data Store Chip-to-Cloud Security Forum 2012 Jens Kohler Mannheim,

Add to Reading List

Source URL: commit.wim.uni-mannheim.de

Language: English - Date: 2012-11-22 16:18:08
    452

    services & solutionS Device management Enable mobile computing & secure data for your users in a bring-your-own-device world The post-PC era predicted by Steve Jobs seven

    Add to Reading List

    Source URL: oxfordcomputergroup.com

    Language: English - Date: 2014-10-14 05:20:01
      453Privacy / Samhain / File integrity monitoring / Tiger / Cross-platform software / Relational database management systems / Integrity / NTFS / Secure Shell / Software / System software / Computing

      Features The Samhain HIDS Overview of available features Rainer Wichmann

      Add to Reading List

      Source URL: www.la-samhna.de

      Language: English - Date: 2011-11-01 18:43:17
      454Ethics / Data privacy / Medical informatics / Health Insurance Portability and Accountability Act / Privacy law / Privacy of telecommunications / Protected health information / Secure messaging / Confidentiality / Health / Email / Computing

      HIPAA Complaint Procedure

      Add to Reading List

      Source URL: www.purdue.edu

      Language: English - Date: 2013-06-27 16:27:45
      455Scripting languages / Cross-platform software / Redirection / Cat / Chmod / Md5sum / Link / Path / Make / Computing / Software / Unix

      BlueCrystal Reference Card Advanced Computer Research Centre https://www.acrc.bris.ac.uk/ Logging In ssh Secure shell.

      Add to Reading List

      Source URL: www.acrc.bris.ac.uk

      Language: English - Date: 2014-01-09 11:53:15
      456Payment systems / Bitcoin / Peer-to-peer computing / Secure multi-party computation / Commitment scheme / Electronic money / Public-key cryptography / Mental poker / PayPal / Cryptography / Cryptographic protocols / Electronic commerce

      Secure Multiparty Computations on Bitcoin Marcin Andrychowicz, Stefan Dziembowski∗ , Daniel Malinowski, Łukasz Mazurek University of Warsaw, Poland {marcin.andrychowicz, stefan.dziembowski, daniel.malinowski, lukasz.m

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2014-04-21 13:48:10
      457Android / Mobile application development / Mobile apps / IOS / IPad / Wind Mobile / Tablet computer / Mobile business intelligence / Smartphones / Computing / Software

      RESEARCH REPORT GOOD TECHNOLOGY TM MOBILITY INDEX REPORT Q2 2014 Report on App, Platform and Device Preferences from the Leader in Secure Mobility This report is part of the Good Technology™ Mobility Index, an ongoing

      Add to Reading List

      Source URL: media.good.com

      Language: English - Date: 2014-08-07 12:15:52
      458Markup languages / Web development / PlayReady / HTML5 / Digital rights management / Adobe Flash / HTML5 in mobile devices / Comparison of HTML5 and Flash / Computing / HTML / Software

      Inside Secure Digisoft tvFINAL

      Add to Reading List

      Source URL: www.insidesecure.com

      Language: English
      459Remote administration software / Telnet / Secure Shell / Cisco IOS / Password / Router / Cisco Systems / Computing / Internet / Network architecture

      Cisco Config Elements Network Monitoring and Management Contents 1 Introduction

      Add to Reading List

      Source URL: nsrc.org

      Language: English - Date: 2014-08-06 02:22:19
      460Central processing unit / Computing / Computer memory / Non-volatile memory / EEPROM / Memory-mapped I/O / Instruction set / PIC16x84 / Atmel AVR / Computer hardware / Microcontrollers / Computer architecture

      Secure Microcontroller AT90SC20818RCV Summary Features General

      Add to Reading List

      Source URL: www.insidesecure.com

      Language: English
      UPDATE