Secure Computing

Results: 5296



#Item
891Web development / Web 2.0 / HTML5 / Markup languages / Scripting languages / WebSocket / Server-sent events / PhoneGap / Mobile application development / Software / Computing / World Wide Web

TECHNOLOGY TRANSFER PRESENTS RICHARD CLARK HTML5, CSS, Javascript Developing secure Best Practices and real-time

Add to Reading List

Source URL: www.technologytransfer.eu

Language: English - Date: 2014-07-03 05:32:00
892Transport Layer Security / Digital cinema / Internet / Computing / Data / Internet standards / Electronic commerce / Secure communication

Microsoft Word - Errata List Round 5 final version.doc

Add to Reading List

Source URL: dcimovies.com

Language: English - Date: 2010-02-28 19:30:22
893Web hosting / Windows Server / SME Server / Cloud computing / Centralized computing / Cloud infrastructure

PRIVATE CLOUD Dedicated Environment with Lower Costs Build a Dedicated Private Cloud computing environment without premises expenditures. Secure maximum returns from IT investments by increasing resource utilization and

Add to Reading List

Source URL: www.webserver.com.my

Language: English - Date: 2015-04-15 06:21:26
894Electronic commerce / Key management / Public-key cryptography / Cryptographic protocols / Secure communication / Transport Layer Security / Client–server model / Apache HTTP Server / Public key certificate / Cryptography / Computing / Internet

WebALPS: A Survey of E-Commerce Privacy and Security Applications S.W. Smith Department of Computer Science/ Institute for Security Technology Studies Dartmouth College Hanover, New HampshireUSA

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:49:08
895Internet / Network architecture / Internet protocols / Internet standards / Electronic commerce / Transport Layer Security / Proxy server / HTTP Secure / Secure Shell / Cryptographic protocols / Computing / Secure communication

Performance Analysis of TLS Web Servers Cristian Coarfa, Peter Druschel and Dan S. Wallach Department of Computer Science Rice University Abstract TLS is the protocol of choice for securing today’s ecommerce and online

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:16:24
896Secure Computing / Computer network security / Security / Proprietary software / Software / Free software / End-user license agreement / Computing / Computer security / Software licenses / Computer law / Law

PDF Document

Add to Reading List

Source URL: www.securecomputing.com

Language: English - Date: 2001-05-02 06:56:40
897Computer data storage / File system / CPU cache / Panasas / Database / Network-Attached Secure Disks / Computing / Software / Computer hardware

• Spring 2007 http://www.pdl.cmu.edu/ newsletter on pdl activities and events pdl consortium

Add to Reading List

Source URL: www.pdl.cmu.edu

Language: English - Date: 2007-05-03 17:43:45
898Computing / Communications protocol / Secure two-party computation / X Window System / Universal composability / Cryptographic protocols / Data / Information

Universally Composable Security: A New Paradigm for Cryptographic Protocols∗ Ran Canetti† July 16, 2013 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-07-16 22:00:04
899Data synchronization / Rsync / Secure Shell / IBM General Parallel File System / File system / Path / Tar / Mv / Find / Computing / System software / Software

PDF Document

Add to Reading List

Source URL: www.rzg.mpg.de

Language: English
900Computing / Image hosting / Photo sharing / Web 2.0 / Windows Explorer / Features new to Windows Vista / Software / System software / User interface techniques

PDF Document

Add to Reading List

Source URL: intranet.secure.griffith.edu.au

Language: English - Date: 2009-12-17 00:38:50
UPDATE