Secure Computing

Results: 5296



#Item
671Access token / Computing / System software / Software / Network file systems / IBM software / OpenAFS

PDF Document

Add to Reading List

Source URL: www.secure-endpoints.com

Language: English - Date: 2006-01-06 01:28:06
672Computing / Cross-platform software / IBM DB2 / Microsoft SQL Server / Oracle Database / DRDA / MySQL / IBM Informix / Multi-master replication / Software / Relational database management systems / Data management

SQDR: Real-time Database Replication Technical Data Sheet SQDR provides data availability and secure replication across multiple databases in real-time, regardless of host or target system location. IT teams experience a

Add to Reading List

Source URL: www.starquest.com

Language: English - Date: 2015-04-30 19:06:16
673War / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / Legal aspects of computing / National Strategy to Secure Cyberspace / International Cybercrime / Computer crimes / Crime / Military science

COMMENT The Case for a Regional Cyber Security Action Task Force Gary Waters The impact of increasing globalisation, greater connectivity via the internet, and increasing access to information via the World Wide Web sugg

Add to Reading List

Source URL: www.securitychallenges.org.au

Language: English - Date: 2011-06-23 07:01:59
674Network architecture / Internet standards / Telnet / Transmission Control Protocol / Portmap / Secure Shell / Port / Ident / Netstat / Internet protocols / Computing / Internet

Lecture 21: Buffer Overflow Attack Lecture Notes on “Computer and Network Security” by Avi Kak () April 2, 2015 3:58pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-02 15:59:28
675Computing / Crime prevention / National security / Software quality / Software security assurance / Vulnerability / Software assurance / Threat model / Application security / Security / Computer security / Cyberwarfare

Fundamental Practices for Secure Software Development A Guide to the Most Effective Secure Development Practices in Use Today OCTOBER 8, 2008 Editor Stacy Simpson, SAFECode

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-08-15 16:06:40
676Computer security / Security / Public key infrastructure / Trusted Computing / Public key certificate / Security token / Public-key cryptography / Key management / Cyberwarfare

SHEMP: Secure Hardware Enhanced MyProxy A Thesis Submitted to the Faculty in partial fulfillment of the requirements for the degree of

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-08-28 17:25:52
677Public safety / Birla Institute of Technology and Science / Computer security / Information security / Institute of Electrical and Electronics Engineers / Security engineering / Cloud computing / Knowledge management / Pilani / Security / Crime prevention / National security

CALL FOR PAPERS A Special Issue on Secure Knowledge Management in Big-data era Information is increasingly becoming important in our daily lives. We have become information dependents of the twenty-first century, living

Add to Reading List

Source URL: www.som.buffalo.edu

Language: English - Date: 2014-06-30 22:56:35
678Internet standards / Microsoft Windows / Email / Lightweight Directory Access Protocol / Transport Layer Security / Security and safety features new to Windows Vista / Encrypting File System / Computing / Internet / Internet protocols

AirZip® FileSECURE™ Features Communicate with Confidence™ AirZip FileSECURE offers a range of unparalleled advanced features that make it the most secure choice for securing your sensitive and confidential files and

Add to Reading List

Source URL: www.airzip.com

Language: English - Date: 2010-03-14 04:20:04
679Central processing unit / Coprocessor / Acorn Computers / Internet protocols / Internet standards / Public-key cryptography / Transport Layer Security / IBM / HTTP cookie / Cryptography / Computing / Computer architecture

Practical server privacy with secure coprocessors by S. W. Smith D. Safford

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:48:27
680Daemon / Operating system / Server / Unix / Internet protocols / Ident / Secure Shell / System software / Software / Computing

Secure4DM A Technical White Paper NOTICE As Secure4DM is a software product which is subject to change, S4Software, Inc. reserves the right to make changes in the specifications and other information contained

Add to Reading List

Source URL: www.s4software.com

Language: English - Date: 2005-01-25 07:01:04
UPDATE