Secure communication

Results: 3134



#Item
581Computer file / Inter-process communication

PDF Document

Add to Reading List

Source URL: intranet.secure.griffith.edu.au

Language: English
582Secure communication / Computing / Data / Internet standards / Cryptographic software / Transport Layer Security / Cipher suite / TLS-PSK / Public-key cryptography / Cryptographic protocols / Cryptography / Internet protocols

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:39:13
583Computer security / Crime prevention / Electronic commerce / National security / Secure communication / Information Technology Industry Council / John Boehner / United States House of Representatives / Security / Computer network security

PDF Document

Add to Reading List

Source URL: www.itic.org

Language: English - Date: 2015-04-21 14:20:33
584Secure communication / Public-key cryptography / Cryptographic protocols / Transport Layer Security / HTTP Secure / HTTP cookie / Certificate authority / Session fixation / Public key certificate / Cryptography / Key management / HTTP

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:25
585Information / Secure communication / Computing / Public-key cryptography / Internet standards / Cipher suite / TLS-PSK / Datagram Transport Layer Security / Trusted third party / Cryptographic protocols / Internet protocols / Data

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 12:09:04
586Bats / Wildlife Acoustics / SM2 / SM3 / Secure Digital / Bioacoustics / Science / Acoustics / Zoosemiotics / Animal communication

PDF Document

Add to Reading List

Source URL: eagle.wildlifeacoustics.com

Language: English - Date: 2014-03-11 10:57:15
587Crime prevention / Electronic commerce / National security / Secure communication / Computer network / Unidirectional network / Technology / Electronic engineering / SCADA / Computer network security / Security / Computer security

PDF Document

Add to Reading List

Source URL: www.fox-it.com

Language: English - Date: 2015-04-23 09:10:05
588Spam filtering / Computer-mediated communication / Spamming / DomainKeys Identified Mail / Microsoft Exchange Server / Anti-spam techniques / Microsoft Outlook / S/MIME / Spam / Computing / Internet / Email

10 reasons to use TFS Gateway with Microsoft Exchange 1. Send large files or sensitive documents with Secure Document Delivery Secure Document Delivery let’s you send large files or sensitive documents with your MS Ou

Add to Reading List

Source URL: www.cmssoft.co.uk

Language: English - Date: 2015-04-01 11:10:48
589Remote procedure call / Middleware / Wireless sensor network / Access control / Node / XML-RPC / Computing / Concurrent computing / Inter-process communication

A SpartanRPC: Remote Procedure Call Authorization in Wireless Sensor Networks PETER CHAPIN and CHRISTIAN SKALKA, University of Vermont We describe SpartanRPC, a secure middleware technology that supports cooperation bet

Add to Reading List

Source URL: web.vtc.edu

Language: English - Date: 2014-10-04 19:42:31
590Cyberwarfare / National security / Secure communication / Malware / Network security / Threat / IT risk / Security / Computer security / Computer network security

ESG Solution Showcase Raytheon Is Addressing the Transformation in Enterprise Security Date: April 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: Information security is getting more difficult all the time.

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:38
UPDATE