Secure Computing

Results: 5296



#Item
701Computing / X Window System / Server / Citrix Systems / Application server / Citrix XenApp / Thin client / Software / Remote desktop / System software

USING THE COMMON CRITERIA IN PRACTICE Mike Nash Gamma Secure Systems Limited Camberley, UK

Add to Reading List

Source URL: www.gammassl.co.uk

Language: English - Date: 2013-01-11 08:16:19
702Cyberwarfare / Wireless security / Virtual private network / Network security / Secure Shell / RADIUS / Transport Layer Security / Cisco Systems VPN Client / Kerberos / Computer network security / Computing / Internet

University of Michigan NETWORK WORKING GROUP Recommendation for Wireless Network Security At the University of Michigan

Add to Reading List

Source URL: www.itcom.itd.umich.edu

Language: English - Date: 2007-11-15 14:00:23
703IBM PC compatibles / SCSI / PCI-X / Host adapter / Conventional PCI / PCI Express / Disk array controller / Intel i960 / Realtek / Computer hardware / Computer buses / Computing

Hardware Compatibility Database for EnGarde Secure Professional 1.5 Nicholas DeClario <> Last updated : June 26, 2003 Abstract This document will cover all the hardware that is known to be compati

Add to Reading List

Source URL: infocenter.guardiandigital.com

Language: English - Date: 2003-06-26 10:10:49
704Information / Computer network security / Protected Extensible Authentication Protocol / Windows Server / Extensible Authentication Protocol / IEEE 802.1X / Windows / Authentication protocol / Transport Layer Security / Computing / Wireless networking / Data

Cisco − Cisco Secure ACS for Windows v3.2 With PEAP−MS−CHAPv2 Machine Authentication Table of Contents Cisco Secure ACS for Windows v3.2 With PEAP−MS−CHAPv2 Machine Authentication.......................1 Docum

Add to Reading List

Source URL: www.awesometechhome.com

Language: English - Date: 2012-11-19 22:22:41
705Peer-to-peer / Computer security / Distributed hash table / Johann Jakob Heckel / Malware / Kademlia / Blacklist / Mannheim / Hash table / Distributed data storage / File sharing networks / Computing

Blacklisting Malicious Web Sites using a Secure Version of the DHT Protocol Kademlia Philipp C. Heckel, University of Mannheim,

Add to Reading List

Source URL: www.philippheckel.com

Language: English - Date: 2009-11-25 08:52:55
706Internet standards / Network architecture / Cryptographic protocols / Computer network security / Emerging technologies / Smart grid / RADIUS / Transport Layer Security / IPsec / Computing / Internet protocols / Internet

ENSURING A SECURE SMART GRID January 2011 GRID NET, INC 340 BRANNAN ST REET

Add to Reading List

Source URL: www.grid-net.com

Language: English - Date: 2012-12-07 14:11:52
707Computing / Internet / Computer network security / Crime prevention / National security / Password / Internet privacy / Privacy / HTTP Secure / Security / Email / Secure communication

CareerStorm Navigator™ Privacy statement This document describes the privacy practices concerning individuals’ use of the CareerStorm NavigatorTM (CS Navigator), a web-based career tool. Security in CareerStorm Navig

Add to Reading List

Source URL: www.careerstorm.com

Language: English - Date: 2014-08-14 04:54:50
708Software engineering / Software / XBase++ / XBase / Transport Layer Security / Windows Server / Session / Client / Harbour / Computing / Query languages / 4GL

Web Server, SOAP Server, & Secure Internet Library for Xbase++ http://www.xb2.net news://news.xb2.net

Add to Reading List

Source URL: www.xb2.net

Language: English - Date: 2007-11-27 12:38:00
709Internet / Internet standards / Rlogin / Secure Shell / Rcp / Unix / Ident / Superuser / Telnet / System software / Internet protocols / Computing

UNIX Basics JANE MARINSKY by Peter Collinson, Hillside Systems

Add to Reading List

Source URL: www.hillside.co.uk

Language: English - Date: 2001-11-27 10:08:14
710Cryptographic protocols / Internet / Data / Secure communication / Transport Layer Security / Cipher suite / Lightweight Directory Access Protocol / FTPS / Extensible Authentication Protocol / Computing / Internet standards / Internet protocols

Advanced Client/Server Authentication in TLS Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsley, Kent E. Seamons, Bryan Smith Computer Science Department Brigham Young University Provo, Utah, USA 84602

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-26 10:17:06
UPDATE