Secure communication

Results: 3134



#Item
941Computer network security / Secure communication / Crime prevention / National security / Files / Managed file transfer / Data governance / Computer file / Computer security / Cloud computing / Computing / Security

Successful business group in office meeting

Add to Reading List

Source URL: www.streem.net

Language: English - Date: 2015-02-19 12:16:14
942Electronic commerce / Secure communication / Cryptographic protocols / Transport Layer Security / Man-in-the-middle attack / Certificate authority / Moxie Marlinspike / Public key certificate / SSL acceleration / Cryptography / Public-key cryptography / Key management

Microsoft PowerPoint - Ivan Ristic - How to Render SSL Useless.ppt

Add to Reading List

Source URL: blog.ivanristic.com

Language: English - Date: 2013-02-15 05:44:27
943Cyberwarfare / Crime / Electronic warfare / Hacking / Military technology / Data breach / Identity theft / Computer security / Computer crime / Security / Computer network security / Secure communication

2014 DATA BREACH INVESTIGATIONS REPORT INSIDER MISUSE DOS ATTACKS

Add to Reading List

Source URL: dti.delaware.gov

Language: English - Date: 2014-05-13 13:02:57
944Psychology / Security / Computer network security / Computer security / National security / Secure communication / Recall / ECO / Email / Mental processes / Mind / Memory

The Network Newsletter – Ebulletin 174, 23 February 2015 Events Events have been added to the Courses & Events pages on The Network website – see: http://www.seapn.org.uk/courses. Funding & Opportunities

Add to Reading List

Source URL: www.seapn.org.uk

Language: English - Date: 2015-02-23 05:21:31
945Computing / Message authentication codes / Password / Ciphertext / Key / Block cipher / Crypt / Secure communication / Transport Layer Security / Cryptography / Cryptographic protocols / Security

CS255: Cryptography and Computer Security Winter 2005 Programming Project #1 Due: Monday, February 7th, 2005.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-01-27 23:01:12
946Email / Secure communication / Internet protocols / Internet standards / STARTTLS / IPv6 / Extended SMTP / Transport Layer Security / SMTPS / Computing / Network architecture / Internet

SENDMAIL RELEASE NOTES This listing shows the version of the sendmail binary, the version of the sendmail configuration files, the date of release, and a summary of the changes in that release

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2015-01-21 12:52:20
947Internet protocols / Internet standards / Cryptographic protocols / Secure communication / FTP / File Transfer Protocol / Secure Shell / Transport Layer Security / Telnet / Internet / Computing / Network architecture

SafeTP: Transparently Securing FTP Network Services Dan Bonachea and Scott McPeak CS Division, EECS Department University of California, Berkeley {bonachea,smcpeak}@cs.berkeley.edu

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2004-11-10 21:04:17
948Computer networking / Network performance / Internet privacy / Cryptographic protocols / Secure communication / Proxy server / Man-in-the-middle attack / HTTP Secure / Keystore / Computing / Internet / Cryptography

CS255: Introduction to Cryptography Winter 2009 Programming Project #2 Due: Wednesday, March 11th, 2009, 11:59 pm

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2009-02-23 12:50:21
949Key management / Internet standards / Secure communication / Keystore / Transport Layer Security / Java Secure Socket Extension / X.509 / Password / Certificate authority / Cryptography / Public-key cryptography / Cryptographic protocols

CS255: Cryptography and Computer Security Winter 2004 Programming Project #2 Due: Wednesday, March 10th, 2004, 11:59 pm

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-02-23 14:40:34
950Computer network security / Software testing / Electronic commerce / Secure communication / Web application security / Application firewall / Cross-site scripting / Penetration test / Application security / Computer security / Cyberwarfare / Computing

Building Web Applications Security Recommendations for Developers Web applications on Internet-facing systems allow access to everyone and operate 24 hours a day and 7 days a week, which leaves them open to attack.

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2013-07-10 11:37:41
UPDATE