Secure Computing

Results: 5296



#Item
771Trusted computing / Microkernel / Security / Trusted computing base / Kernel / Trusted path / L4 microkernel family / Next-Generation Secure Computing Base / Ring / Computer security / Computer architecture / System software

To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004 Reducing TCB size by using untrusted components — small kernels versus virtual-machine monitors Michael Hohmuth

Add to Reading List

Source URL: www.eros-os.org

Language: English - Date: 2005-10-18 08:59:18
772Computer-mediated communication / Email / Secure messaging / Gmail / Google Apps / Google Talk / Instant messaging / Secure communication / Transport Layer Security / Computing / Internet privacy / Internet

Google Message Encryption ABOUT GOOGLE APPS Google Apps is a suite of applications that includes Gmail, Google Calendar (shared calendaring), Google Talk

Add to Reading List

Source URL: www.spaminabox.co.za

Language: English - Date: 2009-06-09 06:29:13
773Coda / Distributed File System / File system / OpenAFS / Kerberos / Global File System / Andrew File System / Network File System / Network file systems / Computing / System software

OpenAFS: An Open Source Wide-Area Distributed File System

Add to Reading List

Source URL: www.secure-endpoints.com

Language: English - Date: 2006-01-06 01:26:52
774HTTP / World Wide Web / Computer network security / Server log / Proxy server / Common Log Format / HTTP cookie / Malware / HTTP Secure / Computing / Internet / Internet privacy

Stealth Attack – Detection and Investigation Ryan Jones and Thomas Mackenzie 25th NovemberW. Madison Street, Suite 1050 Chicago, ILCopyright © 2011 Trustwave Holdings, Inc. All rights reserved.

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:39
775Domain name system / Internet protocols / Akamai Technologies / Content delivery network / Computer network security / Anycast / Domain Name System Security Extensions / Denial-of-service attack / Domain name / Internet / Network architecture / Computing

AKAMAI WEB PERFORMANCE SOLUTIONS: PRODUCT BRIEF Fast DNS DNS resolution that is fast, reliable and secure

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2014-07-18 14:04:01
776Computing / Sudo / Su / OTPW / Environment variable / Command-line interface / Privilege / Secure Shell / Umask / System software / Software / System administration

SUDO(8) OpenBSD System Manager’s Manual SUDO(8)

Add to Reading List

Source URL: www.sudo.ws

Language: English - Date: 2014-01-06 13:00:43
777Data distribution service / Security / Computing / Authentication / OpenSplice DDS / Middleware / System software / Real-Time Innovations

RTI Connext DDS Secure Secure Messaging for Intelligent Machines RTI Connext™ DDS Secure provides the world’s first off-the-shelf messaging platform that delivers the security, performance and safety required for dep

Add to Reading List

Source URL: www.rti.com

Language: English - Date: 2015-04-10 15:34:03
778PostgreSQL / Data / Point-in-time recovery / Secure Shell / Kerberos / Log shipping / Software / Cross-platform software / Computing

PostgreSQL Reference Manual Volume 3: Server Administration Guide for versionJuneThe PostgreSQL Global Development Group

Add to Reading List

Source URL: www.network-theory.co.uk

Language: English - Date: 2010-12-16 14:38:19
779Wandering WiFi / Wireless networking / Cloud computing / Mobile application development / Mobile device management / Windows Mobile / Android / Computing / Technology / Software

Everything You Need to Manage Enterprise Mobility 1. Secure and manage every endpoint in your organization. Smartphones and Tablets Android, Apple iOS, BlackBerry and Windows

Add to Reading List

Source URL: www.air-watch.com

Language: English - Date: 2015-04-22 10:51:04
780File sharing networks / Cryptographic protocols / Secure communication / Cross-platform software / Kademlia / Peer-to-peer / Distributed hash table / Kad network / Transport Layer Security / Software / Computing / Distributed data storage

UNIVERSITY OF MANNHEIM Blacklisting Malicious Web Sites using a Secure Version of the DHT Protocol Kademlia

Add to Reading List

Source URL: www.philippheckel.com

Language: English - Date: 2009-11-25 08:49:15
UPDATE