Secure Computing

Results: 5296



#Item
841Unix / OpenSSH / Secure Shell / Filesystem Hierarchy Standard / Rlogin / Chroot / Ssh-keygen / Inetd / Shadow password / System software / Software / Computing

http://www.LinuxSecurity.com Security Glossary:

Add to Reading List

Source URL: ldp.pakuni.net

Language: English - Date: 2000-09-18 13:37:46
842Security / Cross-platform software / Extensible Messaging and Presence Protocol / Computer security / Instant messaging / United States Department of Homeland Security / International Multilateral Partnership Against Cyber Threats / National Cyber Security Division / Computing / Online chat / Computer-mediated communication

CAPABILITY OVERVIEW Surevine specialise in real-time secure information sharing. We design, build and support secure, scalable collaboration environments for the National, Homeland and Cyber Security domain and organisat

Add to Reading List

Source URL: www.surevine.com

Language: English - Date: 2015-04-10 11:43:15
843MM2 / Cray / Computing / Technology / Electronics / Mark Horowitz / Rambus / Cray-1

Why Now? (for the IoT)! Mark Horowitz! EE & CS, Stanford University! Secure Internet of Things Project Workshop! Stanford University! August 11, 2014!

Add to Reading List

Source URL: iot.stanford.edu

Language: English - Date: 2014-11-10 17:36:09
844Digital audio / Distributed hash table / Peer-to-peer / Kademlia / Chord / Pastry / Key-based routing / Koorde / Session Initiation Protocol / Distributed data storage / Computing / Network architecture

P2PNS: A Secure Distributed Name Service for P2PSIP

Add to Reading List

Source URL: doc.tm.uka.de

Language: English - Date: 2008-03-25 09:28:41
845World Wide Web / Web Services Description Language / Universal Description Discovery and Integration / SOAP / Web Services Discovery / Representational state transfer / Uniform resource identifier / Multitier architecture / Computing / Web services / Web standards

Secure Web Services Architecture A Case Study Matthew G. Marsh President, Paktronix Systems LLC Chief Scientist, NEbraskaCERT

Add to Reading List

Source URL: www.paktronix.com

Language: English - Date: 2004-08-30 22:34:38
846Computer programming / Data types / Memory management / Primitive types / Computer architecture / Pointer / Memory safety / C / Dangling pointer / Computing / Software engineering / Software bugs

In the Proceedings of the 39th International Symposium on Computer Architecture (ISCAWatchdog: Hardware for Safe and Secure Manual Memory Management and Full Memory Safety Santosh Nagarakatte

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2012-05-03 14:35:31
847Wandering WiFi / Wireless networking / Cloud computing / Mobile application development / Mobile device management / Windows Mobile / Android / Computing / Technology / Software

Everything You Need to Manage Enterprise Mobility 1. Secure and manage every endpoint in your organization. Smartphones and Tablets Android, Apple iOS, BlackBerry and Windows

Add to Reading List

Source URL: www.air-watch.com

Language: English - Date: 2015-04-22 10:51:28
848Embedded Linux / Universal Serial Bus / Software / USB flash drive / Secure Digital / Android / Droid 4 / Digital video recorders / Computer hardware / Android devices / Computing

PDF Document

Add to Reading List

Source URL: www.fustec.com

Language: English - Date: 2014-03-20 21:08:37
849Networking hardware / ESCON / FICON / Adapter pattern / Network interface controller / Expansion card / Adapter / EMC Symmetrix / Computer hardware / Computing / Fibre Channel

CCA-3074 Console Concentrator A channel attached Console Appliance providing secure local and remote console solutions for IBM Mainframe processors. The CCA-3074 can also act as a console access backup when OSA-ICC acces

Add to Reading List

Source URL: www.visara.com

Language: English - Date: 2014-11-24 11:38:11
850Data types / Cryptographic protocols / Inter-process communication / Models of computation / Smalltalk / Lambda calculus / Variable / Alice and Bob / Secure multi-party computation / Computing / Software engineering / Computer programming

Capability-based Financial Instruments 1 Mark S. Miller , Chip Morningstar2, Bill Frantz2 1

Add to Reading List

Source URL: www.cypherpunks.to

Language: English - Date: 2008-03-14 04:27:53
UPDATE