Secure Shell

Results: 1082



#Item
751Rural health / Canadian Economics Association / Secure Shell / Education / Academia / McMaster University / Association of Commonwealth Universities / McMaster

C: Infoorts from Researchers Outcomescomes2011.wpd

Add to Reading List

Source URL: socserv.mcmaster.ca

Language: English - Date: 2012-07-11 14:20:29
752League of European Research Universities / Research / Science and technology in Europe / Secure Shell / European Research Council

Note from the League of European Research Universities December[removed]LERU proposes a roadmap to improve the position of SSH-research in the European Research Area

Add to Reading List

Source URL: www.leru.org

Language: English - Date: 2013-12-03 05:52:57
753Lantronix / Evolved HSPA / X Window System / Modem / Secure Shell / Universal Serial Bus / SMS / Software / Technology / Mobile technology

ve ve PremierWave PremierWave

Add to Reading List

Source URL: www.lantronix.com

Language: English - Date: 2013-09-03 20:35:09
754Microsoft Windows / Installation software / Cryptographic software / Windows XP / Windows Installer / Secure Shell / Python / Windows / OpenSSH / Software / System software / Computing

iSiLK A graphical front-end for the SiLK tools Development & Deployment Guide for iSiLK version 0.1.2

Add to Reading List

Source URL: tools.netsa.cert.org

Language: English - Date: 2010-02-19 14:58:27
755Validity / Cryptography standards / Elliptic Curve DSA / Digital signature / Secure Shell / Validation / Verification and validation / FIPS 140-2 / Cryptography / Public-key cryptography / Pharmaceutical industry

The Elliptic Curve Digital Signature Algorithm Validation System (ECDSAVS) September 7, 2004 Lawrence E. Bassham III

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-01-05 00:00:00
756Globus Toolkit / Secure Shell / OpenID / Identity management / TeraGrid / Computing / Grid computing / Federated identity

IAM Online Federated Services for Scientists Thursday, December 9, 2010 – 1 p.m. EST Rachana Ananthakrishnan Argonne National Laboratory & University of Chicago Jim Basney

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2010-12-09 15:49:26
757Internet protocols / Speex / BeagleBoard / Remote administration / Secure Shell / Port / Transmission Control Protocol / Firewall / Software / Computing / System software

Martin Ewing, AA6E 28 Wood Rd, Branford, CT 06520; [removed] A Software-Based Remote Receiver Solution Need to get your receiver off site to avoid interference?

Add to Reading List

Source URL: www.arrl.org

Language: English - Date: 2014-01-09 16:58:15
758Computing / Ssh-keygen / Secure Shell / OpenSSH / Secure copy / X Window System / Comparison of SSH clients / Ssh-agent / Tunneling protocol / Software / Cryptographic software / System software

iSiLK A graphical front-end for the SiLK tools User’s Guide for iSiLK version[removed]January 2011

Add to Reading List

Source URL: tools.netsa.cert.org

Language: English - Date: 2011-03-23 09:07:22
759Lantronix / Evolved HSPA / X Window System / Modem / Secure Shell / Universal Serial Bus / SMS / Software / Technology / Mobile technology

ve ve PremierWave PremierWave

Add to Reading List

Source URL: www.lantronix.com

Language: English - Date: 2013-09-03 20:35:10
760Network architecture / FTP / Internet standards / Healthcare Effectiveness Data and Information Set / Managed care / File Transfer Protocol / Comparison of FTP client software / Secure Shell / Email / Internet / Internet protocols / Computing

HEDIS DATA REQUEST PROCESS The following steps outline the general process for the HEDIS report request. [PRE PROCESS] 1. Setup an agreement for HEDIS data request with a participating region. (The agreed access form wil

Add to Reading List

Source URL: www.cairweb.org

Language: English - Date: 2013-12-10 16:50:47
UPDATE