Secure communication

Results: 3134



#Item
441Law / Computer network security / Secure communication / Electronic commerce / Information privacy / Internet privacy / Personally identifiable information / United States Department of Homeland Security / Data breach / Security / Ethics / Privacy

Cybersecurity Assessment: What Will the Regulators Be Looking For?

Add to Reading List

Source URL: www.buckleysandler.com

Language: English - Date: 2015-03-18 15:48:10
442Computer security / Crime prevention / Electronic commerce / National security / United States Department of Energy / Security / Computer network security / Secure communication

· Department of Energy Washington, DCJuly 28,2010 MEMORANDUM FOR MAITHEW S. MCCORMICK

Add to Reading List

Source URL: www.directives.doe.gov

Language: English - Date: 2014-01-11 02:33:27
443Internet privacy / Secure communication / Public-key cryptography / Secure Real-time Transport Protocol / Encryption / Shared secret / Key / Skype security / Index of cryptography articles / Cryptography / Key management / Cryptographic protocols

Secure Calls & Messages Best practice cryptography Peer-to-peer communication Maximum security Superior voice quality

Add to Reading List

Source URL: www.crypttalk.com

Language: English - Date: 2015-02-20 10:27:12
444Security / Finance / Computer network security / Computer security / National security / Secure communication / Sourcefire / Cyberwarfare / Seed money / Private equity / Venture capital / Financial economics

Cybersecurity Software Startup ThreatQuotient Raises $1.5M Seed, Blu Venture Investors Dulles, Va.-based cybersecurity software startup ThreatQuotient has raised a $1.5 million seed round led by Blu Venture Investors, th

Add to Reading List

Source URL: www.angelcapitalassociation.org

Language: English - Date: 2015-05-12 14:08:39
445Internet protocols / Computing / Internet / Cryptographic software / Internet standards / Transport Layer Security / HTTP Secure / Cipher suite / OpenSSL / Cryptography / Secure communication / Cryptographic protocols

Preface You are about to undertake a journey into the mysterious world of cryptography. I’ve just completed mine—writing this book—and it’s been an amazing experience. Although I’d been a user of SSL since its

Add to Reading List

Source URL: sslmate.com

Language: English - Date: 2015-06-08 18:16:46
446Lua / Internet privacy / Voice-mail / Secure communication / Software / Computing / Cross-platform software

LUA FEATURE OVERVIEW: REAL-TIME MESSAGING Reach Coworkers, Get Answers, and Work Faster Your fast-moving organization needs secure communication that can keep

Add to Reading List

Source URL: d3bsvvf4vvpyeg.cloudfront.net

Language: English - Date: 2015-05-08 14:40:41
447Network architecture / Internet standards / URI schemes / Cryptographic protocols / Secure communication / HTTP pipelining / Transmission Control Protocol / Hypertext Transfer Protocol / HTTP Secure / Computing / Internet / HTTP

http2 explained Background, the protocol, the implementations and the future http://daniel.haxx.se/http2/ by Daniel Stenberg

Add to Reading List

Source URL: daniel.haxx.se

Language: English - Date: 2015-05-21 04:06:53
448Computer network security / Computer security / Crime prevention / National security / Secure communication / Government / United States Department of Homeland Security / Cyber-security regulation / National Cyber Security Division / Security / Public safety / Cyberwarfare

HOMELAND SECURITY Team Leaders: Larry Davis, Deputy Executive Director, California Fire and Rescue Training Authority, (

Add to Reading List

Source URL: www.metrochamber.org

Language: English - Date: 2015-04-06 17:21:01
449Network architecture / Tor / Transmission Control Protocol / Relay / Transport layer / SOCKS / Onion routing / Secure communication / Asynchronous Transfer Mode / Internet privacy / Computing / Internet

IMUX: Managing Tor Connections from Two to Infinity, and Beyond John Geddes† † Rob Jansen‡

Add to Reading List

Source URL: www.robgjansen.com

Language: English - Date: 2015-06-06 16:07:00
450Crime prevention / Electronic commerce / National security / Secure communication / University of Piraeus / European Network and Information Security Agency / Security / Computer network security / Computer security

Cyber security in education in Greece Sokratis K. Katsikas Systems Security Laboratory University of Piraeus

Add to Reading List

Source URL: resilience.enisa.europa.eu

Language: English - Date: 2015-05-18 07:24:14
UPDATE