Secure communication

Results: 3134



#Item
471Payment systems / Electronic commerce / Computer security / Cyberwarfare / Data breach / Identity theft / Credit card / Chip and PIN / Debit card / Security / Computer network security / Secure communication

April 2015 Issue DELAWARE DEPARTMENT OF TECHNOLOGY & INFORMATION DTI e Security News

Add to Reading List

Source URL: dti.delaware.gov

Language: English - Date: 2015-04-22 11:55:47
472HTTP / Secure communication / Internet protocols / Key management / Public-key cryptography / HTTP Secure / HTTP Strict Transport Security / SPDY / Google Chrome / Computing / Software / Internet

Why take HTTPS seriously? It is very easy to dismiss a correct implementation

Add to Reading List

Source URL: blog.squixa.com

Language: English - Date: 2014-11-23 21:30:15
473Cryptographic protocols / Cryptographic software / Hashing / Secure communication / IPsec / HMAC / Secure Shell / Key generation / Cryptographic hash function / Cryptography / Computing / Internet protocols

IC2M Security Policy_rel5

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-28 11:20:09
474Computer security / Crime prevention / Electronic commerce / Secure communication / National security / Security / Computer network security

Federal Facilities Council (FFC) Cyber Securing Building Control Systems National Academies Keck Center March 24, 2015

Add to Reading List

Source URL: sites.nationalacademies.org

Language: English - Date: 2015-03-25 14:07:41
475Cryptography / Year of birth missing / Public safety / Computer network security / Computer security / Secure communication / Lance Hoffman / Information security / Gene Spafford / Security / Crime prevention / National security

President Barack Obama The White House 1600 Pennsylvania Avenue NW Washington, DCMay 19, 2015 Dear President Obama,

Add to Reading List

Source URL: static.newamerica.org

Language: English - Date: 2015-05-18 16:52:50
476A10 Networks / Denial-of-service attack / HTTP Secure / Computing / Transmission Control Protocol / Cyberwarfare / Security / Load balancing / Computer network security / Cryptographic protocols / Secure communication

4 REASONS you need a HIGH PERFORMANCE ADC

Add to Reading List

Source URL: www.a10networks.com

Language: English - Date: 2015-03-10 18:51:23
477Technology / Business / Economics / Mobile payment / Radio-frequency identification / Contactless payment / Payment / Vivotech / Near field communication / Electronic commerce / Payment systems / Mobile telecommunications

For immediate release Mobeewave closes $6.5 Million Series A round to bring disruptive NFC mobile terminalization to the payment world. Montreal, Canada – February 16, Mobeewave, the leader in fast and secure

Add to Reading List

Source URL: mobeewave.com

Language: English - Date: 2015-02-17 10:29:41
478Computer security / Public safety / Education / Computer network security / Secure communication / Application security / Scholarship / Information security / Security / Crime prevention / National security

Join our team of winners. Abisola Togunde, Eastern Michigan University, SWSIS 2014

Add to Reading List

Source URL: swsis.files.wordpress.com

Language: English - Date: 2014-12-05 12:41:57
479Computer security / Crime prevention / National security / Secure communication / Evaluation Assurance Level / Public safety / Computer network security / Security / Evaluation

Press release Paris, December 15th 2014 The French Ministry of Foreign Affairs protects its tablets with ERCOM how to benefit from innovative mobile features with high-end security

Add to Reading List

Source URL: www.ercom.com

Language: English - Date: 2014-12-15 12:14:14
480Secure communication / Transport Layer Security / Symmetric-key algorithm / RC4 / Block cipher modes of operation / Stream cipher / Ciphertext / Padding / Cryptographic hash function / Cryptography / Cryptographic protocols / Internet protocols

1 SSL, TLS, and Cryptography We live in an increasingly connected world. During the last decade of the 20th century the Internet rose to popularity and forever changed how we live our lives. Today we rely on our phones a

Add to Reading List

Source URL: sslmate.com

Language: English - Date: 2015-06-06 19:18:36
UPDATE