Secure communication

Results: 3134



#Item
731Spam filtering / Internet / Cloud Computing / Email backbone / Technology / Sendmail / Messaging Architects / IBM Lotus Notes / Secure messaging / Email / Computing / Computer-mediated communication

W H I T E PA P E R Public Network Can an Enterprise Email Backbone Infrastructure be Moved to the Cloud?

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2010-12-20 15:40:05
732Technology / Cryptographic protocols / Computing / Key management / Secure communication / Temporal Key Integrity Protocol / Wireless security / Distributed coordination function / Wi-Fi / Wireless networking / IEEE 802.11 / Cryptography

Advanced Wi-Fi Attacks Using Commodity Hardware Mathy Vanhoef Frank Piessens iMinds-DistriNet

Add to Reading List

Source URL: people.cs.kuleuven.be

Language: English - Date: 2014-12-05 07:10:36
733Key management / Quantum key distribution / Key distribution / Key / Advanced Encryption Standard / Secure Communication based on Quantum Cryptography / Cryptography / Quantum cryptography / Quantum information science

REDEFINING SECURITY CERBERIS THE BEST OF CLASSICAL AND QUANTUM WORLDS LAYER 2 LINK ENCRYPTION

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:12
734Internet / Cryptographic protocols / Secure communication / Internet privacy / HTTP cookie / Cross-site scripting / Cross-site request forgery / Man-in-the-middle attack / JavaScript / Computing / HTTP / Cyberwarfare

INTERNET STANDARDS AND WEB SECURITY Jeff Hodges PayPal August 2012

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-08-23 16:12:20
735Spamming / Computer-mediated communication / Spam filtering / Anti-spam techniques / Commtouch / Email spam / Shun Hing Square / Spam / Email filtering / Email / Internet / Computing

TTAsia Secure Email Over the Cloud Telecommunications & Technology Asia Ltd 

Add to Reading List

Source URL: www.infocloud.gov.hk

Language: English - Date: 2013-03-17 23:55:10
736Computer security / Crime prevention / National security / Secure communication / Public safety / International Multilateral Partnership Against Cyber Threats / Security / Cyberwarfare / Computer network security

2015 Cyber Security Megatrends Infographic_MENA_English

Add to Reading List

Source URL: www.raytheon.com

Language: English - Date: 2015-04-17 12:04:23
737Computer network security / Computer crimes / Crime prevention / National security / Secure communication / Identity theft / Cyberwarfare / Computer security / Internet privacy / Security / Computing / Crime

IS YOU R P R IVACY U N DE R T H R EAT? Sue Jowett Business Development Manager AMA Insurance Brokers

Add to Reading List

Source URL: www.amainsurance.com.au

Language: English - Date: 2015-04-16 03:44:55
738Internet standards / Internet protocols / Secure communication / Cryptographic protocols / Electronic commerce / Transport Layer Security / Proxy server / Password / Computing / Internet / Network architecture

Security Policy Revision Date: 23 April 2009 Remote Desktop Support • Versionor later for Windows

Add to Reading List

Source URL: www.trustx.ch

Language: English - Date: 2012-03-12 07:45:40
739Computer network security / Computer security / Crime prevention / Electronic commerce / National security / Secure communication / VMware / Data center / Network virtualization / System software / Computing / Cloud computing

RESEARCH BRIEF Zero Trust THE NETWORK SECURITY INFRASTRUCTURE OF TOMORROW INTRODUCTION

Add to Reading List

Source URL: www.govloop.com

Language: English - Date: 2015-03-11 16:40:09
740Internet protocols / Internet standards / Secure communication / FIPS 140-2 / HMAC / Advanced Encryption Standard / NetBackup / Cryptographic hash function / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Hashing

Microsoft Word - 1a - SYMC NBU FIPS 140 Security Policy v1-0.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-14 11:56:40
UPDATE