Secure Computing

Results: 5296



#Item
561Display technology / Plasma display / X Window System / Framing / Taskbar / Internet / Software / System software / Computing

Communiqué InterActive Solutions, Inc. TextStreaming (Secure, Internet C.A.R.T.) Quick Launch Instructions

Add to Reading List

Source URL: yourtickettowork.com

Language: English - Date: 2015-05-18 17:02:58
562Computing / Network architecture / Speedera Networks / Content delivery network / Akamai Technologies / Internet

Making the Internet Business-Ready. Fast, Reliable and Secure. The Internet is becoming essential to our daily lives. The world around us is rapidly evolving and technology is pushing the limits of what

Add to Reading List

Source URL: www.akamai.fr

Language: English - Date: 2014-09-10 08:54:01
563Bluetooth / Wireless networking / Wireless / ZigBee / Communications protocol / Bluetooth protocols / Technology / Computing / Telecommunications engineering

SDDR: Light-Weight, Secure Mobile Encounters Matthew Lentz† Viktor Erd´elyi‡ Paarijaat Aditya‡ Elaine Shi† Bobby Bhattacharjee† Peter Druschel‡

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2014-07-12 12:18:28
564Cryptographic protocols / Portable software / FTP / Internet protocols / Health informatics / SSH File Transfer Protocol / FileZilla / File Transfer Protocol / Health Level 7 / Software / Computing / Network architecture

Meaningful Use Stage 2 (MU2) CCR Cancer Data Transmission Options Secure FTP Transmission 1. Request access to the Secure File Transfer Protocol (SFTP) service by sending a request to - with subject

Add to Reading List

Source URL: hie.cdph.ca.gov

Language: English - Date: 2015-01-29 18:01:01
565Data security / System software / Software / NetApp / BAE Systems / Computer data storage / Backup software / Computing / Backup

Case study New storage platform at BAE Systems Hägglunds Major streamlining of all storage management Backups were taking longer and longer to complete, and IT specialists were constantly having to turn out to secure th

Add to Reading List

Source URL: www.proact.lv

Language: English - Date: 2012-01-23 10:42:38
566Systems theory / State space / International Obfuscated C Code Contest / Classical cipher / Control theory / Computing / Computer programming

F o r m a l M o d e l s for C o m p u t e r S e c u r i t y CARL E. LANDWEHR Code 7593, Naval Research Laboratory, Washington, D CEfforts to build "secure" computer systems have now been underway for more than a

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:59:28
567IEEE 802.11 / Wireless security / Secure Digital / Wireless networking / Technology / Wireless / O2 wireless box / Huawei E5 / Computer network security / Computing / Wi-Fi

Making Wi-Fi Connectivity easy on Microcontroller platforms Product Brief HDG200, Wireless LAN 802.11b/g/n System in Package – Preliminary, Optimized for High Volume

Add to Reading List

Source URL: www.hdwireless.se

Language: English - Date: 2015-05-29 04:27:57
568Computing / Software testing / Software engineering / Application security / Electronic commerce / Cross-site scripting / Vulnerability / Penetration test / Zero-day attack / Cyberwarfare / Computer security / Computer network security

Improving your Secure SDLC ( SSDLC ) with Prevoty How adding real-time application security dramatically decreases vulnerabilities February 2015

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2015-06-04 23:45:14
569Technology / Radio-frequency identification / Ubiquitous computing / Stream ciphers / Computer memory / Wireless identification and sensing platform / Impinj / Computer data storage / Card reader / Automatic identification and data capture / Computing / Cryptography

CCCP: Secure Remote Storage for Computational RFIDs∗ Mastooreh Salajegheh1 Shane Clark1 Benjamin Ransford1 Kevin Fu1 Ari Juels2 1 Department of Computer Science, University of Massachusetts Amherst 2 RSA Laboratories,

Add to Reading List

Source URL: spqr.eecs.umich.edu

Language: English - Date: 2012-12-06 13:30:53
570Document management system / Computing / Human resource management system / Technology / Email / Information technology management / Human resource management / Management

ACCESS AND CONTROL GLOBAL HR INFO Aggregate, organize and secure HR information into a single, online view Bring together information from any source such as HRIS and other HR-related systems, paper documents, emails.

Add to Reading List

Source URL: peopledoc.s3.amazonaws.com

Language: English - Date: 2014-07-31 04:37:31
UPDATE