Secure Computing

Results: 5296



#Item
881Information security management system / Computing / Information technology management / ISO/IEC 27000-series / ISO/IEC 27001 lead auditor / ISO/IEC 27003 / Data security / ISO/IEC 27001

ISO/IECISMS Implementation Guidelines) Dr. David Brewer Gamma Secure Systems Limited www.gammassl.co.uk

Add to Reading List

Source URL: www.gammassl.co.uk

Language: English - Date: 2013-01-11 08:18:10
882Plug-in / Kerberos / Software / Computing / Computer network security

Developing Plug-ins for Network Identity Manager Asanka Herath Agenda

Add to Reading List

Source URL: www.secure-endpoints.com

Language: English - Date: 2007-08-03 07:43:46
883Wandering WiFi / Wireless networking / Cloud computing / Mobile application development / Mobile device management / Windows Mobile / Android / Computing / Technology / Software

Everything You Need to Manage Enterprise Mobility 1. Secure and manage every endpoint in your organization. Smartphones and Tablets Android, Apple iOS, BlackBerry and Windows

Add to Reading List

Source URL: www.air-watch.com

Language: English - Date: 2015-04-22 10:51:17
884Computing / Secure Digital / Bluetooth / Universal Serial Bus / Personal digital assistant / Technology / Mobile computers / Computer hardware

Microsoft Word - PartE2 SDIO Bluetooth Type-A Simplified V1.00 060403TC.doc

Add to Reading List

Source URL: www.sdcard.org

Language: English - Date: 2014-09-09 01:59:00
885Cloud infrastructure / Bitnami / Installation software / Virtual machines / Azure Services Platform / Azure / Password / X Window System / Secure Shell / System software / Software / Computing

Deploying Bitnami Stacks on Windows Azure In this whitepaper we walk you through the process of setting up a Bitnami cloud image stack on Windows Azure and look at the advantages over other deployment methods.

Add to Reading List

Source URL: bitnami.com

Language: English - Date: 2015-04-10 13:41:01
886Cross-platform software / Splint / Lint / C / Buffer overflow / Pointer / Iterator / Computing / Software engineering / Computer programming

Splint Manual VersionJune 2003 Secure Programming Group University of Virginia

Add to Reading List

Source URL: lclint.cs.virginia.edu

Language: English - Date: 2003-06-05 12:00:50
887Software / User identifier / Group identifier / Setuid / Chmod / Filesystem permissions / Privilege separation / Superuser / Privilege / Unix / Computing / System software

writing_secure_privileged_programs-PRINTABLE

Add to Reading List

Source URL: man7.org

Language: English - Date: 2015-05-07 06:42:59
888Deep packet inspection / Videotelephony / Cisco Unified Computing System / Desktop virtualization / VMware / Virtualization / Xeon / Computing / Centralized computing / Cisco Systems

Beaufort Memorial Hospital Provides Secure Virtual Desktops to Clinical Staff

Add to Reading List

Source URL: www.unleashingit.com

Language: English - Date: 2014-06-03 12:59:25
889Web annotation / Annotation / Annotea / Shibboleth / Portable Document Format / Extensible Messaging and Presence Protocol / Text annotation / Computing / Information / Data

A Synchronous Multimedia Annotation System for Secure Collaboratories Ronald Schroeter, Jane Hunter, Jonathon Guerin, Imran Khan, Michael Henderson The University of Queensland St Lucia, Qld, Australia 4072 +

Add to Reading List

Source URL: dart.edu.au

Language: English - Date: 2006-12-03 10:50:07
890Interrupts / Device driver / Operating system / Embedded system / Personal computer hardware / I²C / Secure Digital / Ring / Computer architecture / Computing / Computer hardware

Automated OS-level Device Runtime Power Management Chao Xu Felix Xiaozhu Lin Yuyang Wang

Add to Reading List

Source URL: www.ruf.rice.edu

Language: English - Date: 2015-01-26 21:05:03
UPDATE