Secure communication

Results: 3134



#Item
721Technology / Disability / Educational technology / Information and communication technologies in education / Victorian Essential Learning Standards / Information and communications technology / Inclusion / Sport / Education / Information technology / Communication

Tasmania Curriculum Audit Year 9/10 — Standard 5 Core content strands Reading and viewing a

Add to Reading List

Source URL: secure.ausport.gov.au

Language: English - Date: 2015-01-06 23:24:08
722Mobile telecommunications / Videotelephony / Telephony / Mobile phones / Oral communication / Telephone call / Roaming / Satellite phone / SMS / Technology / Mobile technology / Electronic engineering

STANDARD DESK AND MOBILE PHONE CHARGES DESK PHONE SERVICES Service Description

Add to Reading List

Source URL: intranet.secure.griffith.edu.au

Language: English - Date: 2009-01-11 22:58:20
723Data breach / Data security / Secure communication / Identity theft / Hack / Computing / Laptop / Cyberwarfare / Security / Computer network security / Computer security

Breached: A chronology of every major data breach sinceIf you were asked to guess how many personal data records (containing social security numbers,

Add to Reading List

Source URL: www.forthepeople.com

Language: English - Date: 2014-12-22 08:59:07
724Software / Email client / Internet Message Access Protocol / Message transfer agent / Gmail / Mail / IPhone / Push email / Yahoo! Mail / Email / Computing / Computer-mediated communication

Setting Up iPhone™ Email Technical Manual: Configuration and Setup Setting Up an IMAP Email Account 1. Tap the Settings icon. Document Updated: 2/09

Add to Reading List

Source URL: secure.toolkitfiles.co.uk

Language: English - Date: 2009-08-07 05:28:42
725Computer network security / Computer security / Electronic commerce / Secure communication / Public safety / Security / Crime prevention / National security

Access to sensitive data: Thoughts from the UK experience Felix Ritchie The framework principle • A model of data access

Add to Reading List

Source URL: www.statisphere.govt.nz

Language: English - Date: 2010-04-18 22:48:14
726Internet / Internet protocols / Network architecture / Internet standards / Electronic commerce / Transport Layer Security / Cipher suite / Transmission Control Protocol / HTTP Secure / Cryptographic protocols / Secure communication / Computing

Client Server HTTPS SSL/TLS Session for SPDY This sequence diagram covers the establishment of a SSL/TLS connection for sending Google SPDY data. The protocol flow covers:

Add to Reading List

Source URL: www.eventhelix.com

Language: English - Date: 2015-03-03 14:20:22
727SAP AG / Computing / Adobe Systems / Adobe Connect / SAP Business One / Computer-mediated communication / Business software / Open Travel Alliance

Adobe Connect Success Story SAP SAP adopts Adobe® Connect™ software enterprise-wide for secure web conferencing, improving productivity and slashing annual travel expenses

Add to Reading List

Source URL: www.pico.it

Language: English - Date: 2013-10-28 05:37:32
728Cryptography / Access control / Videotelephony / Advanced Encryption Standard / EMC Corporation / SecurID / Smart card / Radio-frequency identification / Authentication / Security / Technology / Ubiquitous computing

Unifying IP Communication Secure Profile Management Enterprise Security and Identity Management for IP-based Systems LiteScape Secure Profile Management™ unifies an organization’s identity management systems with IP

Add to Reading List

Source URL: www.litescape.com

Language: English - Date: 2011-09-08 18:03:53
729Cyberwarfare / Computer security / LifeWise Health Plan of Oregon / Data security / Data breach / Premera Blue Cross / National security / Oregon / Security / Computer network security / Secure communication

NEWS RELEASE Director’s Office, 350 Winter St. NE, Room 200, Salem, OregonFor immediate release: March 24, 2015

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2015-03-25 11:40:43
730Network architecture / Multilayer switch / Networking hardware / Load balancing / Nortel / Network switch / Transport Layer Security / Virtual private network / HTTP Secure / Computing / Cryptographic protocols / Secure communication

Nortel Networks Alteon Application Switch Family—Optimizing networks for business application performance

Add to Reading List

Source URL: www.andovercg.com

Language: English - Date: 2010-01-09 22:28:24
UPDATE