Secure Computing

Results: 5296



#Item
511Computer network security / Crime prevention / National security / Public safety / Auditing / DMZ / Information security / Statement on Auditing Standards No. 70: Service Organizations / Data center / Security / Computing / Computer security

Send Word Now Security and Technology Overview Send Word Now’s goal is to provide a completely secure, flexible, scalable, and reliable system that customers can trust. Our infrastructure is based on a strong foundatio

Add to Reading List

Source URL: www.sendwordnow.com

Language: English - Date: 2011-01-27 15:29:18
512Display technology / Plasma display / X Window System / Framing / Taskbar / Internet / Software / System software / Computing

Communiqué InterActive Solutions, Inc. TextStreaming (Secure, Internet C.A.R.T.) Quick Launch Instructions

Add to Reading List

Source URL: yourtickettowork.com

Language: English - Date: 2015-05-18 17:02:59
513Internet / Internet privacy / Webmail / Cryptographic software / Hushmail / PGP / PayPal / Anonymous remailer / Anonymity / Email / Computing / Computer-mediated communication

Anonymous Email Services Smart Card A Using an Anonymous Email Account Anonymous Email Services - Do’s and Don’ts • Always use a secure browser that anonymizes your IP address for accessing anonymous

Add to Reading List

Source URL: www.cannon.af.mil

Language: English - Date: 2014-12-03 12:43:08
514Windows Vista / Microsoft SQL Server / Windows Server System / Web chat / Web application / JavaScript / Computing / Software / Online chat

Secure Collaboration Tool theChatTool CHALLENGES AND OBJECTIVES CLIENT

Add to Reading List

Source URL: www.aisoftwarellc.com

Language: English - Date: 2015-04-14 13:44:20
515Checkbox / Form / Computing / Human–computer interaction / Youth Violence and Juvenile Justice / User interface techniques / Software / Password

Surveys of Enacted Curriculum (SEC) Project ON-LINE SURVEY REGISTRATION PROCEDURES Go to: www.seconline.org 1. Click on the “Registrar” button along the top of the page. 2. Click on the drop down menu in the “Not R

Add to Reading List

Source URL: secure.wceruw.org

Language: English - Date: 2006-05-19 15:59:09
516Cloud infrastructure / Cloud storage / Data center / Computer security / Cloud communications / IBM cloud computing / Cloud computing / Computing / Centralized computing

G-Cloud Infrastructureas-a-Service Secure scalable pay as you use cloud services The trusted way to deploy your IT Not all Infrastructure-as-a-Service (IaaS) is the same. As a buyer you should take great care in selectin

Add to Reading List

Source URL: www.scc.com

Language: English - Date: 2015-04-24 05:49:47
517Lua / Software / Computing / Cross-platform software

Respond Faster With Lua 
 Stay prepared and alert with mobile messaging that is secure, instant and keeps everyone accountable.

Add to Reading List

Source URL: d3bsvvf4vvpyeg.cloudfront.net

Language: English - Date: 2015-04-08 13:06:18
518Software / Information appliances / Technology / Android / Embedded Linux / IPhone / Internet privacy / BlackBerry / Windows Phone / Smartphones / Computing / Cloud clients

Securing Your Smartphone, Step By Step Follow these steps to protect your private information. Before You Set Up Secure your email, social media accounts and other subscription services. 1. Don’t share your accounts wi

Add to Reading List

Source URL: rebootpeterborough.ca

Language: English - Date: 2013-04-28 04:03:04
519Cryptography / Packaging / Tamper resistance / National Security Agency / Two-factor authentication / EMC Symmetrix / Check Point / Security / Computer security / Computing

PRODUCT BRIEF CryptoManager™ Infrastructure Secure Foundation for Connected Devices Connected products, including mobile phones and Internet of Things (IoT) devices have a critical need for security. Robust security s

Add to Reading List

Source URL: www.rambus.com

Language: English - Date: 2014-06-13 13:31:23
520IEEE 802.11 / Wireless security / Secure Digital / Wireless networking / Technology / Wireless / O2 wireless box / Huawei E5 / Computer network security / Computing / Wi-Fi

Making Wi-Fi Connectivity easy on Microcontroller platforms Product Brief HDG200, Wireless LAN 802.11b/g/n System in Package – Preliminary, Optimized for High Volume

Add to Reading List

Source URL: www.hd-wireless.se

Language: English - Date: 2015-05-29 04:27:57
UPDATE