Secure Computing

Results: 5296



#Item
661Ethics / Information / Security / Privacy / Data erasure / Shred / Paper shredder / Backup / Internet privacy / Computing / Data security / Data management

DATA BYTE Captricity for Enterprise Data Privacy, Security & Disaster Recovery Overview Secure, HIPPA-compliant enterprise data transformation is our specialty at Captricity. We realize the sensitive nature of your busi

Add to Reading List

Source URL: captricity.com

Language: English - Date: 2014-10-28 11:45:41
662HTTP Secure / Secure communication / Scanner / HTTP cookie / Advertising network / Computing / Security / HTTP / Internet / Internet privacy

Media Scanner for Encryption Compliance The expansion of HTTPS encryption presents unexpected challenges As reports on the government’s wide-spread surveillance programs emerged, Google, Yahoo and others responded by

Add to Reading List

Source URL: www.themediatrust.com

Language: English - Date: 2014-10-10 18:25:12
663Fabless semiconductor companies / Computing / BlackBerry / XScale / Marvell Technology Group / Tegra / Graphics processing unit / ATI Technologies / AMD mobile platform / Computer architecture / ARM architecture / Computer hardware

Marvell PXA310 Processor Series Rich Multimedia with Scalable Performance up to 624 MHz for Cost-Effective and Power-Efficient Secure 3.5G Smartphones, Portable Navigation/Entertainment Devices, and Embedded Solutions PR

Add to Reading List

Source URL: www.marvell.com

Language: English - Date: 2011-08-30 18:32:50
664Computer network security / Marketing / Intel / Computing / Customer relationship management / Digital security / Computacenter / Adobe Solutions Network / Business / McAfee / Companies listed on the New York Stock Exchange

Secure Your Success Intel Security Partner Program Today’s digital security threats are more sophisticated and complex than ever. At the same time, computing advancements are opening up new possibilities for exploring

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-12-31 14:13:54
665Electronic commerce / Secure communication / Internet / Computer networking / Windows Server / Transport Layer Security / Computer security / Security service / Security and safety features new to Windows Vista / Computing / Computer network security / Security

PDF Document

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2001-08-05 10:53:54
666Internet protocols / Internet standards / Port / Simple Mail Transfer Protocol / Secure Shell / Telnet / File Transfer Protocol / Network News Transfer Protocol / Hypertext Transfer Protocol / Computing / Internet / Network architecture

PDF Document

Add to Reading List

Source URL: www.heroix.com

Language: English - Date: 2008-03-10 14:45:21
667Biometrics / Information / Lookup table / Computing / Security / Secure multi-party computation

PDF Document

Add to Reading List

Source URL: www.cs.haifa.ac.il

Language: English - Date: 2015-01-19 06:59:50
668HTTP / Cryptographic protocols / Secure communication / Internet protocols / Computer network security / Cyberoam / Application firewall / Reverse proxy / World Wide Web / Computing / Internet / Network architecture

PDF Document

Add to Reading List

Source URL: www.cyberoam.com

Language: English - Date: 2014-07-01 06:43:28
669Computer hardware / Network-Attached Secure Disks / Network-attached storage / Local area networks / Telecommunications engineering / Computer data storage / Panasas / Storage area network / CLARiiON / Computing / Computer storage / Information

PDF Document

Add to Reading List

Source URL: www.pdl.cmu.edu

Language: English - Date: 2001-05-02 16:30:57
670Computing / Cyberwarfare / Single sign-on / Windows / Computer network security / Computer security / Kerberos

PDF Document

Add to Reading List

Source URL: www.secure-endpoints.com

Language: English - Date: 2007-05-10 16:58:34
UPDATE