Secure communication

Results: 3134



#Item
221Internet protocols / Cryptographic protocols / Secure communication / Transport Layer Security / Hypertext Transfer Protocol / World Wide Web / HTTPS / Subdomain

#wcchi #AdvancedWPChi WordCamp Chicago 2016 SEO Audit Techniques Ryan Erwin

Add to Reading List

Source URL: internetmarketing.chicago.com

Language: English - Date: 2016-05-01 12:31:45
222Data security / Crime prevention / National security / Secure communication / Business continuity and disaster recovery / Computer security / USB flash drive / Backup / Personal cloud / CSC Version 6.0 / USB flash drive security

Solution overview Code42 CrashPlan: Security Tools Visibility helps you identify insider threats

Add to Reading List

Source URL: essentials.code42.com

Language: English - Date: 2016-06-04 10:31:09
223

WHITE PAPER Security in M2M Communication — What is secure enough? Motivation

Add to Reading List

Source URL: www.m2m-alliance.com

Language: English - Date: 2013-07-16 03:39:49
    224Cyberwarfare / Cybercrime / Computer security / Computer network security / Secure communication / EHNAC / Health Insurance Portability and Accountability Act / Cybersecurity Information Sharing Act / United States Department of Homeland Security / Accreditation / Cyber-security regulation / Cyber security standards

    Cybersecurity Protection in Healthcare: How Accreditation Can Mitigate Your Risk

    Add to Reading List

    Source URL: www.ehnac.org

    Language: English - Date: 2016-05-09 17:07:24
    225Computing / Cryptography / Secure communication / Security / Internet privacy / Crypto-anarchism / Mix network / Traffic analysis / Mixminion / Anonymous remailer / Denial-of-service attack / Len Sassaman

    Heartbeat Traffic to Counter (n-1) Attacks Red-Green-Black Mixes George Danezis Anonymizer, IncMission Center Road, PMB 426

    Add to Reading List

    Source URL: www0.cs.ucl.ac.uk

    Language: English - Date: 2013-10-10 06:48:57
    226Computing / Security / Cyberwarfare / Computer security / Computer network security / Crime prevention / National security / Secure communication / Threat Stack / Threat / Cloud computing security / Cloud computing

    T HR E AT STACK + AMAZON IN SP ECTO R REA C H I NG CLO UD SEC U RI T Y IN DE P TH & SC A L E Achieve Stronger Security in the Cloud

    Add to Reading List

    Source URL: www.threatstack.com

    Language: English - Date: 2016-03-16 05:52:51
    227Teleconferencing / Computer-mediated communication / Videotelephony / Groupware / Technology / Educational technology / Computing / Assistive technology / Web conferencing / Videoconferencing / Telecommuting / Computer-supported collaboration

    White Paper GOVERNMENT AGENCIES SEEK SECURE, H I G H - P E R F O R M A N C E W E B C O L L A B O R AT I O N How to Manage the Risks and Opportunities of Networked Conferencing, Meetings and Training

    Add to Reading List

    Source URL: www.ilinc.com

    Language: English - Date: 2012-05-14 19:31:17
    228Security / Computer security / Cyberwarfare / Formal methods / Logic in computer science / E-commerce / Secure communication / Cryptographic software / Formal verification / Cryptographic protocol / Vulnerability / ProVerif

    More Secure Software Systems by Formal Verification, Property-Based Testing, Secure Compilation, and Dynamic Monitoring Cătălin Hrițcu Inria Paris, Prosecco team

    Add to Reading List

    Source URL: prosecco.gforge.inria.fr

    Language: English - Date: 2015-12-15 12:26:17
    229Computing / Security / Cyberwarfare / Computer security / Computer network security / Crime prevention / National security / Secure communication / Threat Stack / Threat / Cloud computing security / Cloud computing

    T HR E AT STACK + AMAZON IN SP ECTO R REA C H I NG CLO UD SEC U RI T Y IN DE P TH & SC A L E Achieve Stronger Security in the Cloud

    Add to Reading List

    Source URL: www.threatstack.com

    Language: English - Date: 2016-02-17 08:56:28
    UPDATE