Secure Computing

Results: 5296



#Item
691Technical communication tools / User interfaces / Remote administration software / Telnet / Terminal emulator / Secure Shell / X Window System / Emulator / Software / Computing / System software

Information at all.nethttp://all.net/

Add to Reading List

Source URL: all.net

Language: English - Date: 2013-12-01 21:40:09
692Computer security / Crime prevention / National security / Secure communication / Lookout / Public safety / Computer network security / Electronic commerce / Security

COMPANY PROFILE SECURITY FOR THE POST-PC ERA Computing has changed forever. Mobile devices are only the beginning of a

Add to Reading List

Source URL: www.lookout.com

Language: English - Date: 2015-05-14 19:29:26
693Dell Inspiron / Dell Latitude / Intel vPro / Secure Digital / Computing

GETAC F11 0 Fully Ru g g ed Tab l e t Features Animal Systems Ltd, The Threshing House, Middle Yard, Berwick St. Leonard, Salisbury, Wiltshire, SP3 5SN

Add to Reading List

Source URL: www.animalsystems.co.uk

Language: English - Date: 2013-10-24 05:10:20
694Domain name system / Internet protocols / Akamai Technologies / Content delivery network / Computer network security / Anycast / Domain Name System Security Extensions / Denial-of-service attack / Domain name / Internet / Network architecture / Computing

AKAMAI WEB PERFORMANCE SOLUTIONS: PRODUCT BRIEF Fast DNS DNS resolution that is fast, reliable and secure

Add to Reading List

Source URL: www.akamai.de

Language: English - Date: 2014-07-18 14:04:01
695Smart card / Technology / Secure Digital / ISO standards / Ubiquitous computing

Microsoft Word - Part A1 ASSD Extension Simplified Specification Ver2.00 Finaldoc

Add to Reading List

Source URL: www.sdcard.org

Language: English - Date: 2014-09-09 01:58:00
696Secure communication / Computing / Technology / Business / Application software / Linoma Software / Managed file transfer

LINOMA SOFTWARE CELEBRATES 20 YEAR ANIVERSARY Linoma Software is celebrating 20 years in helping organizations around the world to automate their IT processes and protect sensitive data. The company will commemorate this

Add to Reading List

Source URL: blog.linomasoftware.com

Language: English - Date: 2014-11-17 15:54:35
697System software / Network File System / Lustre / OpenAFS / HP-UX / Kerberos / Solaris / Server Message Block / Generic Security Services Application Program Interface / Network file systems / Computing / Software

OpenAFS Road Map Discussion - Best Practice Workshop 2007

Add to Reading List

Source URL: www.secure-endpoints.com

Language: English - Date: 2007-11-06 16:55:48
698Qualys / Internet / Network architecture / Electronic commerce / HTTP / Transport Layer Security / HTTP Secure / Application programming interface / Password / Computing / Cryptographic protocols / Secure communication

Qualys SSL Labs Terms of Use v2.2 ! By accessing, browsing or using this website, and/or downloading any of its software, content or information, you acknowledge that you have read, understand and agree to be bound by t

Add to Reading List

Source URL: dev.ssllabs.com

Language: English - Date: 2015-05-17 07:50:02
699Trusted computing / Espionage / Trusted Platform Module / Coprocessor / Tamper resistance / Kernel / Integrity / IBM / Secure cryptoprocessor / Computer security / Security / Cryptography

SECURITY Magic Boxes and Boots: Security in Hardware

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-19 15:35:31
700Network architecture / Internet protocol suite / Telnet / Port / Transmission Control Protocol / Application layer / Communications protocol / Secure Shell / NicheStack TCP/IPv4 / Computing / Data / Internet protocols

Microsoft Word - embedded_ethernet_intro_final.doc

Add to Reading List

Source URL: www.digikey.com

Language: English - Date: 2011-01-11 11:24:02
UPDATE