Secure Computing

Results: 5296



#Item
521Display technology / Plasma display / X Window System / Framing / Taskbar / Internet / Software / System software / Computing

Communiqué InterActive Solutions, Inc. TextStreaming (Secure, Internet C.A.R.T.) Quick Launch Instructions

Add to Reading List

Source URL: yourtickettowork.com

Language: English - Date: 2015-04-22 19:07:37
522Internet protocols / Secure communication / Cryptographic protocols / Cryptographic hash functions / Cipher suite / SHA-2 / Transport Layer Security / RC4 / OpenSSL / Cryptography / Cryptographic software / Computing

Magdeburger Journal zur Sicherheitsforschung Gegründet 2011 | ISSN: Herausgegeben von Stefan Schumacher und Jörg Sambleben Erschienen im Magdeburger Institut für Sicherheitsforschung Why Android SSL was dow

Add to Reading List

Source URL: www.sicherheitsforschung-magdeburg.de

Language: English - Date: 2013-12-11 11:42:27
523Internet standards / Cryptography / Cryptographic protocols / Electronic commerce / Internet protocols / Transport Layer Security / SSL acceleration / IBM Secure Blue / Computing / Internet / Secure communication

SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES Contents

Add to Reading List

Source URL: www.zscaler.com

Language: English - Date: 2015-04-01 12:38:31
524Computing / Software / Windows XP / Secure Digital / Windows Vista

1810 NDSU Research Circle N Fargo, NDSERVICE BULLETIN NUMBER: SUBJECT: VISION 1000 EMBEDDED SOFTWARE UPDATE #6

Add to Reading List

Source URL: www.appareo.com

Language: English - Date: 2014-10-11 00:51:27
525Cloud infrastructure / Cloud storage / Data center / Computer security / IBM cloud computing / IICCRD / Cloud computing / Computing / Centralized computing

G-Cloud Linux-asa-Service Secure Management of a Linux Server platform The trusted way to deploy your Linux Servers Built on Sentinel by SCC’s Infrastructure-as-a-Service, our Linux service provides pre-accredited and

Add to Reading List

Source URL: www.scc.com

Language: English - Date: 2015-04-24 05:51:07
526Internet / Cryptography / Internet standards / Internet protocols / Electronic commerce / Transport Layer Security / HTTP Secure / Password / FTPS / Computing / Cryptographic protocols / Secure communication

Instant, Secure and Accountable Lua Security Whitepaper Security is Paramount We know that when you communicate with your team, information security is paramount.

Add to Reading List

Source URL: citrixready.citrix.com

Language: English - Date: 2015-06-09 15:09:38
527Software testing / Computing / Cryptographic software / Secure Shell / Hacking / Penetration test / Vulnerability / OpenSSH / Application security / Computer security / Computer network security / Cyberwarfare

Appendix B FEDERAL VOTING ASSISTANCE PROGRAM VOTING PENETRATION TEST CONTRACT NUMBER: HHS CASU WII-0037-CALIBRE August 15, 2011

Add to Reading List

Source URL: www.fvap.gov

Language: English - Date: 2015-04-24 11:32:57
528Electronic engineering / IEEE 802.1X / Wireless security / Fortinet / Wi-Fi / IEEE 802.11 / Wireless LAN / MIMO / Wireless access point / Computer network security / Computing / Technology

FortiAPTM-11C, 14C, 28C Secure Remote Access Points The Need for Secure Remote Access Points Enterprises are looking to increase productivity through uninterrupted access to applications and resources, without compromisi

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:08:51
529BindView / Symantec / WatchGuard / Updata / Internet security / Rovi Corporation / InterTrust Technologies / Technology / Computer security / Computing / Secure Computing

Security Brief Wednesday March 20, 2002 Company News Mergers & Acquisitions Network Associates plans to repurchase the

Add to Reading List

Source URL: signalhill.in

Language: English - Date: 2013-09-25 15:28:43
530Data security / System software / Software / NetApp / BAE Systems / Computer data storage / Backup software / Computing / Backup

Case study New storage platform at BAE Systems Hägglunds Major streamlining of all storage management Backups were taking longer and longer to complete, and IT specialists were constantly having to turn out to secure th

Add to Reading List

Source URL: www.proact.dk

Language: English - Date: 2012-01-23 10:42:38
UPDATE