Secure Computing

Results: 5296



#Item
781OSI protocols / S/MIME / MIME / DomainKeys Identified Mail / Outlook Express / Secure messaging / Anti-spam techniques / Email / Computing / Computer-mediated communication

1 Towards Usefully Secure Email Chris Masone and Sean Smith Department of Computer Science Dartmouth College

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2007-01-31 11:21:21
782Programming language / Eval / JavaScript / Information flow / Computer programming / Computing / Software engineering / Non-interference

Secure multi-execution through static program transformation: extended version Gilles Barthe Juan Manuel Crespo Dominique Devriese

Add to Reading List

Source URL: lirias.kuleuven.be

Language: English
783Computing / Secure Shell / Ssh-keygen / OpenSSH / Secure copy / SSHFS / File Transfer Protocol / Comparison of SSH clients / Comparison of SSH servers / Software / System software / Cryptographic software

MASTERCLASS SSH AN INTRODUCTION TO SSH Get to grips with SSH and lord it over remote machines… I

Add to Reading List

Source URL: www.linuxvoice.com

Language: English - Date: 2015-01-08 10:21:46
784Computing / Interrupts / Secure Digital / Conventional PCI / Integrated circuits / Computer architecture / Computer hardware / IBM PC compatibles

SD Specifications Part A2 SD Host Controller Simplified Specification Version 3.00 February 25, 2011

Add to Reading List

Source URL: www.sdcard.org

Language: English - Date: 2014-09-09 01:58:00
785Network management / System administration / Internet protocols / Internet standards / Computer network security / Iptables / Syslog / Snort / Slide / Computing / Software / System software

Secure Web Services Architecture A Case Study Matthew G. Marsh President, Paktronix Systems LLC Chief Scientist, NEbraskaCERT

Add to Reading List

Source URL: www.paktronix.com

Language: English - Date: 2004-08-30 22:34:38
786Network protocols / Wireless networking / Distributed data storage / Internet broadcasting / Multicast / Routing / Secure multicast / Network topology / Wireless ad-hoc network / Network architecture / Internet / Computing

D:Documents and SettingsLoukasDesktopvtc04hier_tree.eps

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English
787Computing / Internet protocols / Secure communication / HTTP / HTTP Secure / Port / Communications protocol / Transmission Control Protocol / ARPANET / Data / Cryptographic protocols / Information

Communication over Challenged Networks Keith Winstein Stanford University Secure Internet of Things Project Workshop Stanford University

Add to Reading List

Source URL: iot.stanford.edu

Language: English - Date: 2014-11-10 17:36:13
788Archive formats / Computer storage media / Optical Storage Technology Association / Reference / Evaluation / File system / Optical disc authoring / ISO image / Globally unique identifier / Disk file systems / Computing / Universal Disk Format

Secure UDF® Specification Revision 1.00 February 26, 26, 2002

Add to Reading List

Source URL: www.osta.org

Language: English - Date: 2011-03-22 15:06:38
789Companies listed on the New York Stock Exchange / Data loss prevention software / HP Enterprise Services / Data classification / Technology / Host Based Security System / McAfee VirusScan / Computer security / McAfee / Computing

Solution Brief HP Data Loss Prevention Services Establish a secure, sustainable information management structure built on McAfee technology

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:03:45
790Cloud storage / Data security / Backup / Microsoft SQL Server / Microsoft Exchange Server / Comparison of online backup services / Uranium Backup / Software / Computing / Backup software

Korialys CloudProtect! ! Korialys provides seamless and secure backup of your data to the cloud and takes care of the management and monitoring for you.

Add to Reading List

Source URL: www.korialys.hk

Language: English - Date: 2014-05-22 04:46:49
UPDATE