Secure Computing

Results: 5296



#Item
611Electronics / OSI protocols / IEEE standards / Local area networks / Network architecture / 10 Gigabit Ethernet / Power over Ethernet / Network switch / Virtual LAN / Ethernet / Computing / Networking hardware

DATA SHEET FortiSwitch™ B and C-Series Secure Access Switches FortiSwitch B and C-Series

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:15:07
612Cryptography / Internet protocols / Computer security / Cryptography standards / Tunneling protocols / Transport Layer Security / Secure Shell / Fortinet / FIPS 140-2 / Computing / Computer network security / Cryptographic protocols

FIPSSecurity Policy FortiOS™ 5.0 STATUS ALARM HA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-29 10:54:02
613Computing / Internet / Windows Server / Email / Malpensa Airport

Secure Sharing Case Study SEA S.p.A. SEA is the company that manages the Milan airports, namely Linate and Malpensa, providing centralized airport services such as operations, logistics, information systems , surveillan

Add to Reading List

Source URL: www.booleserver.com

Language: English - Date: 2014-12-10 19:00:00
614Electronics / OSI protocols / IEEE standards / Local area networks / Network architecture / 10 Gigabit Ethernet / Power over Ethernet / Network switch / Virtual LAN / Ethernet / Computing / Networking hardware

DATA SHEET FortiSwitch™ B and C-Series Secure Access Switches FortiSwitch B and C-Series

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:15:07
615Database management systems / Multilevel security / Data management / Security / Replication / Database / Ring / Data dictionary / Operating system / Computer security / Computing / Data

A Practical Approach to High Assurance Multilevel Secure Computing Service To appear, Proc.10th Annual

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:27
616Secure communication / Cryptography / Email / HTTP / HTTP Secure / Password / Transport Layer Security / Phishing / Jumbleme / Internet / Computing / Cryptographic protocols

NJM Security Policy Protecting Your Information: NJM protects customers’ information with physical, technical, and procedural controls and maintains compliance with federal and state regulations. We employ in-house as

Add to Reading List

Source URL: www.njm.com

Language: English - Date: 2014-12-15 09:48:42
617Web application frameworks / Microsoft Visual Studio / Internet Server Application Programming Interface / Integrated Windows Authentication / Global.asax / Web.config / Digest access authentication / Internet Information Services / ASP.NET AJAX / Software / Computing / ASP.NET

Are You Protected? Design and Deploy Secure Web Apps with ASP.NET 2.0 and IISMSDN Magazine, November 2005

Add to Reading List

Source URL: www.tabpi.org

Language: English - Date: 2007-08-14 08:06:00
618Microsoft Excel / Delimiter-separated values / Spreadsheet / Delimiter / Comma / Computing / Software / Comma-separated values

State of Kansas Unclaimed Property Uploading a Spreadsheet to our Secure Server UpdatedVisit https://online.treasurer.state.ks.us/public_upload_1.php to get our Excel Template. Click on the link for the te

Add to Reading List

Source URL: www.kansasstatetreasurer.com

Language: English - Date: 2012-12-04 08:17:45
619IEEE 802 / Power over Ethernet / Small form-factor pluggable transceiver / 10 Gigabit Ethernet / Network switch / Virtual LAN / IEEE 802.3 / Link aggregation / Private VLAN / Ethernet / OSI protocols / Computing

DATA SHEET FortiSwitch™ D-Series Secure Access Switches FortiSwitch D-Series

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:15:12
UPDATE