Secure Computing

Results: 5296



#Item
871Information technology management / Lantronix / Console server / Secure Shell / Telnet / Network switch / Serial port / Universal Serial Bus / USB flash drive / Out-of-band management / Computing / System software

NEW! Medical LANTRONIX SLC 8000 ®

Add to Reading List

Source URL: www.lantronix.com

Language: English - Date: 2014-10-01 18:11:15
872Network architecture / Internet standards / Files / Managed file transfer / Secure Shell / Ipswitch /  Inc. / FTPS / File Transfer Protocol / Computing / FTP / Internet

TECHNICAL SOLUTIONS GUIDE EFSS and Managed File Transfer Finding the Solution that Meets Your Needs Compare File Sharing and Managed File Transfer Solutions

Add to Reading List

Source URL: www.ipswitchft.com

Language: English - Date: 2014-05-09 16:13:23
873Financial institutions / Institutional investors / Contract law / Palladium / Next-Generation Secure Computing Base / First Church of Christ /  Scientist / Insurance / Lease / Law / Private law / Matter

Using the Palladium TERMS AND CONDITIONS Revision Date: 5/8/12

Add to Reading List

Source URL: www.mypalladium.org

Language: English - Date: 2012-09-18 11:59:50
874Network-Attached Secure Disks / Network-attached storage / Computer storage / Local area networks / Telecommunications engineering / Data management / Storage area network / Computer data storage / File server / Computing / Computer hardware / Information

THE THE NEWSLETTER ON PARALLEL DATA SYSTEMS • FALL 1998

Add to Reading List

Source URL: www.pdl.cmu.edu

Language: English - Date: 2002-06-05 19:33:42
875Distributed Computing Environment / Distributed computing / Grid computing / Simple public key infrastructure

Secure Naming for Distributed Computing using the Condensed Graph Model by Thomas Brendan Brabants Quillinan, B.Eng., M.Sc.

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2007-10-09 07:25:53
876Internet Relay Chat / Cyberwarfare / Videotelephony / Ident / Distributed firewall / Firewall / Skype / Denial-of-service attack / Secure Shell / Software / Computing / Computer network security

Delegating Network Security with More Information Jad Naous Ryan Stutsman Stanford University

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2012-10-04 00:45:33
877Secure multi-party computation / Homomorphic encryption / Computational complexity theory / Computing / Boolean circuit / Circuit / Mathematics / Verifiable computing / Secure two-party computation / Cryptographic protocols / Cryptography / Applied mathematics

Computing on Encrypted Data Secure Internet of Things Seminar David Wu January, 2015 New Applications in the Internet of Things

Add to Reading List

Source URL: iot.stanford.edu

Language: English - Date: 2015-01-12 23:28:56
878Software / Computer hardware / IPad / ITunes / Multi-touch / Microsoft SharePoint / Tablet computer / Laptop / Acronis True Image / Computing / Classes of computers / Personal computing

DATASHEET ACRONIS® ACCESS SECURE CONTENT ACCESS, SYNC AND SHARE SOLUTION CONTROL. SECURE. MOBILIZE. Enterprise IT is struggling to secure and control content access, sync and share, especially on mobile devices, withou

Add to Reading List

Source URL: acronis.cz

Language: English - Date: 2014-09-26 07:29:34
879Microsoft Windows / Windows XP / Computing / Software / System software / Network file systems / IBM software / OpenAFS

OpenAFS for Windows: One Year Later Jeffrey Eric Altman jaltman *at* secure-endpoints *dot* com

Add to Reading List

Source URL: www.secure-endpoints.com

Language: English - Date: 2006-01-06 01:26:06
880Compound annual growth rate / Economics / Economy of Finland / Computing / Antivirus software / F-Secure / Malware

F-Secure Corporation Annual General Meeting 2009 CEO Kimmo Alkio, Contents • Market review

Add to Reading List

Source URL: www.f-secure.com

Language: English - Date: 2014-12-02 06:29:27
UPDATE