Secure Computing

Results: 5296



#Item
551Network switch / Transmission Control Protocol / Computing / Internet / Computer network security / Secure Shell / Middlebox

Managing the Network with Merlin Merlin flickr.com/photos/retiredinwasaga

Add to Reading List

Source URL: frenetic-lang.org

Language: English - Date: 2013-11-22 15:02:04
552Cloud infrastructure / IBM cloud computing / Kaavo / Cloud computing / Centralized computing / Computing

G-Cloud Hybrid Cloud Solutions Deploying physical assets in a secure cloud The trusted way to deploy your IT In a complex IT environment, complete virtualisation is not always possible. In a typical secure Cloud Infrastr

Add to Reading List

Source URL: www.scc.com

Language: English - Date: 2015-04-24 05:47:18
553Cryptographic protocols / Key management / Secure communication / Electronic commerce / Transport Layer Security / HTTP Secure / Public key certificate / X.509 / Java version history / Cryptography / Computing / Public-key cryptography

Magdeburger Journal zur Sicherheitsforschung Gegründet 2011 | ISSN: Herausgegeben von Stefan Schumacher und Jörg Sambleben Erschienen im Magdeburger Institut für Sicherheitsforschung This article appears in

Add to Reading List

Source URL: www.sicherheitsforschung-magdeburg.de

Language: English - Date: 2015-03-20 16:20:14
554Distributed data storage / Local area networks / Cloud applications / Data synchronization / Gluster / Distributed file system / Computer cluster / Dropbox / SAS / Computing / Software / Network file systems

SCALE OUT ARCHITECTURE FOR SECURE ENTERPRISE FILE SHARING SCALE-OUT ARCHITECTURE FOR SECURE ENTERPRISE FILE SHARING Challenge With proliferation of mobile devices like smartphone and tablets, Bring Your Own Device

Add to Reading List

Source URL: pydio.com

Language: English - Date: 2015-01-27 14:09:44
555Evaluation / National Security Agency / Computer network security / Common Criteria / Secure Shell / OpenSSH / Operating system / System administrator / Security-Enhanced Linux / Computer security / Computing / System software

EAL3 Evaluated Configuration Guide for Red Hat Enterprise Linux Klaus Weidner <> June 29, 2004; v1.2 atsec is a trademark of atsec GmbH

Add to Reading List

Source URL: ltp.sourceforge.net

Language: English - Date: 2006-08-02 13:13:54
556Security / Data / Identity management / Security Assertion Markup Language / Password / HTTP Secure / Computing / Cryptographic protocols / Secure communication

Security  Guide,  April  2015           Zoom  is  a  cloud  service  that  provides  a  3-­‐in-­‐1  meeting  platform  with  HD  video  conferencing

Add to Reading List

Source URL: d24cgw3uvb9a9h.cloudfront.net

Language: English - Date: 2015-05-26 03:48:05
557Computing / Electronic engineering / Fortinet / Wireless security / Wi-Fi / Wireless LAN / IEEE 802.11 / Power over Ethernet / Wireless access point / Computer network security / Technology / Wireless networking

FortiAP -112B TM Secure Business-grade Wireless Access Point The Need for a Fortified Wireless LAN Enterprises are looking to increase productivity through uninterrupted access to

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:09:34
558Cloud storage / File hosting / Data security / Web services / Backup / Amazon S3 / Public-key cryptography / Key management / Database / Computing / Network file systems / Cloud computing

FADE: Secure Overlay Cloud Storage with File Assured Deletion Yang Tang† , Patrick P. C. Lee† , John C. S. Lui† , and Radia Perlman‡ † The Chinese University of Hong Kong ‡ Intel Labs

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2010-10-18 05:22:07
559Cerberus Capital Management / GXS / Enterprise application integration / Electronic commerce / Web services / Computer file formats / General Electric / B2B Gateway / Service-oriented architecture / Computing / Technology / Information technology management

www.gxs.co.uk GXS Managed Services for Financial Institutions As a financial services institution in today’s digital economy your business depends upon the secure and reliable exchange of information electronically wi

Add to Reading List

Source URL: www.gxs.co.uk

Language: English
560IPad / Apple Inc. / Email / Computer hardware / Computing / Password / Wi-Fi

Connect to UAMWifi-Secure Mobile devices, Laptop, IPad, Kindles MOBILE PHONE CONNECTION SETUP 1. Go to Settings and then turn Wi-Fi ON

Add to Reading List

Source URL: uam-web2.uamont.edu

Language: English - Date: 2015-04-30 12:51:26
UPDATE