Secure Computing

Results: 5296



#Item
761Internet protocols / Internet standards / Cryptographic software / Secure Shell / Ssh-agent / Rlogin / Telnet / File Transfer Protocol / Password / Software / Computing / System software

Intro. to discussion on Interactive sessions and password security A.J.Flavell Glasgow PPE Group UK HEP SYSMAN @ UCL, 30 Sept 1998

Add to Reading List

Source URL: hepwww.rl.ac.uk

Language: English - Date: 2007-05-14 10:18:37
762Information security management system / ISO JTC 1/SC 27 / Common Criteria / International Organization for Standardization / Security / Information technology management / ISO/IEC 27001 / Data security / Computer security / Computing

Common Criteria Development – Lessons from the ISMS World Dr. Mike Nash Gamma Secure Systems Limited www.gammassl.co.uk

Add to Reading List

Source URL: www.gammassl.co.uk

Language: English - Date: 2013-01-11 08:16:40
763Markup languages / Internet marketing / Cross-platform software / JavaScript / Brightcove / Eloqua / HTML5 / HubSpot / Scripting language / Computing / Web analytics / Software engineering

Rapt Media Interactive Video: The “Download” easy to use · safe and secure

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2015-01-13 18:55:14
764Computing / Ambient intelligence / Internet of Things / Tcpcrypt / Secure multi-party computation / Dan Boneh / Cloud computing / Computer security / Cryptography / Cryptographic protocols / Computer network security

IoT: a Security and Privacy Perspective! Dan Boneh! Stanford University! Secure Internet of Things Project Workshop! Stanford University!

Add to Reading List

Source URL: iot.stanford.edu

Language: English - Date: 2014-11-10 17:36:07
765Computing / Data / Internet protocols / Evaluation / Secure Shell / Cipher suite / Common Criteria / HTTP Secure / Blue Coat Systems / Security / Secure communication / Cryptographic protocols

Microsoft Word - Certification Report - Blue Coat

Add to Reading List

Source URL: fmv.se

Language: English - Date: 2015-03-06 05:07:31
766Computer programming / Type theory / Type conversion / Primitive data type / Subtype polymorphism / Ada / Array data type / Enumerated type / C / Software engineering / Computing / Data types

Safe and Secure Software An Invitation to Ada

Add to Reading List

Source URL: www.adacore.com

Language: English - Date: 2012-03-22 11:54:57
767Data management / ASP.NET / Microsoft Visual Studio / Form / SQL injection / Web.config / Data validation / Web application security / Cross-site scripting / Computing / Software / Web application frameworks

Secure Coding Practices for .NET ApplicationsWPFinal.doc

Add to Reading List

Source URL: www.cgisecurity.com

Language: English - Date: 2008-11-02 16:09:54
768Data / Information / Secure communication / Internet standards / Datagram Transport Layer Security / Handshaking / Transport Layer Security / Internet protocols / Cryptographic protocols / Computing

INTERNATIONAL TELECOMMUNICATION UNION COM 16 – LS 142 – E TELECOMMUNICATION STANDARDIZATION SECTOR

Add to Reading List

Source URL: datatracker.ietf.org

Language: English - Date: 2015-03-04 15:15:03
769Holism / Source code / Subroutine / University of Cambridge Computer Laboratory / Ada / Stack / Lock / Operating system / Computing / Computer programming / Software engineering

Safe and Secure Software An Invitation to Ada

Add to Reading List

Source URL: www.adacore.com

Language: English - Date: 2012-03-22 11:43:45
770Secure communication / Cyberwarfare / Data security / Computing / National security / Information privacy / Data breach / Data at Rest / Information security / Security / Computer network security / Computer security

Defining Security Software Solutions: DataVantage Software & Data Privacy To properly understand the role of DataVantage® software in protecting sensitive information it is best to not only understand what it is but als

Add to Reading List

Source URL: datavantage.com

Language: English - Date: 2013-08-24 12:01:17
UPDATE