Trusted Computing

Results: 881



#Item
201Central processing unit / Trusted computing / Booting / Ring / Operating system / Kernel / Next-Generation Secure Computing Base / CPU cache / BIOS / Computer architecture / Computing / System software

Certifying Program Execution with Secure Processors Benjie Chen Robert Morris MIT Laboratory for Computer Science {benjie,rtm}@lcs.mit.edu Abstract Cerium is a trusted computing architecture that protects

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2003-06-03 23:21:03
202Next-Generation Secure Computing Base / Secure Shell / Remote administration / Computer security / Trusted computing / System software

Certifying Program Execution with Secure Processors Benjie Chen Robert Morris Laboratory for Computer Science

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2003-05-28 11:51:35
203Computing / Unified Extensible Firmware Interface / System Management Mode / X86 virtualization / Rootkit / Trusted Execution Technology / Personal computer hardware / Virtual machine / Booting / System software / Software / BIOS

Into the Unknown: Assessing your BIOS Vulnerabilities Xeno Kovah Lead InfoSec Engineer MITRE Approved for Public Release; Distribution Unlimited. Case Number

Add to Reading List

Source URL: dl.mandiant.com

Language: English - Date: 2015-05-11 08:19:08
204Computer-mediated communication / Spamming / Internet / DomainKeys Identified Mail / Salesforce.com / Email spam / Force.com / Email authentication / Anti-spam techniques / Email / Computing / Spam filtering

Trusted Message Delivery for Salesforce.com Overview With Trusted Message Delivery for Salesforce.com, we deploy one or more specially configured Sentrions either on your premises or in a hosted environment to route mail

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2010-04-21 19:52:08
205Computer-mediated communication / Spamming / Internet / DomainKeys Identified Mail / Salesforce.com / Email spam / Force.com / Email authentication / Anti-spam techniques / Email / Computing / Spam filtering

Trusted Message Delivery for Salesforce.com Overview With Trusted Message Delivery for Salesforce.com, we deploy one or more specially configured Sentrions either on your premises or in a hosted environment to route mail

Add to Reading List

Source URL: sendmail.com

Language: English - Date: 2010-04-21 19:52:08
206Opera Software / Interactive television / Portable software / Markup languages / HTML5 / Hybrid Broadcast Broadband TV / Presto / CE-HTML / Opera / Software / Computing / HTML

Opera Devices SDK 3.x Proven, trusted platform for HTML5 rendering on embedded devices Provides full HTML5 functionality on devices with limited capabilities. Premium content

Add to Reading List

Source URL: www.operasoftware.com

Language: English - Date: 2014-09-01 10:09:42
207Application software / Computing / AutoCAD / .dwg / Mudbox / Autodesk Vault / Computer-aided design / AutoCAD Architecture / Autodesk / Software / 3D graphics software

Take design further with AutoCAD Experience the design software trusted by millions of professionals worldwide for over 30 years Design and shape the world around you Autodesk AutoCAD 2014 enriches collaboration and map

Add to Reading List

Source URL: www.manandmachine.ro

Language: English - Date: 2013-08-06 08:26:10
208Public safety / Standards organizations / Government / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / National Institute of Standards and Technology / National Strategy for Trusted Identities in Cyberspace / United States Department of Homeland Security / Cloud computing / Computer network security / Security / Computer crimes

Update on the Cybersecurity Framework July 31, 2014 The Framework for Improving Critical Infrastructure Cybersecurity (“The Framework”) was issued on February 12, 2014, as directed by the President in Executive Order

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2014-07-31 16:13:52
209Spamming / Computing / Internet / DomainKeys Identified Mail / Email filtering / Email spam / Challenge–response spam filtering / Email authentication / Email / Spam filtering / Computer-mediated communication

Trusted Message Delivery for SaaS-based CRM Systems Overview With Trusted Message Delivery for software-as-a-service(SaaS) CRM systems, we deploy one or more specially configured Sentrions either on your premises or in a

Add to Reading List

Source URL: sendmail.com

Language: English - Date: 2010-09-29 16:12:10
210Spamming / Computing / Internet / DomainKeys Identified Mail / Email filtering / Email spam / Challenge–response spam filtering / Email authentication / Email / Spam filtering / Computer-mediated communication

Trusted Message Delivery for SaaS-based CRM Systems Overview With Trusted Message Delivery for software-as-a-service(SaaS) CRM systems, we deploy one or more specially configured Sentrions either on your premises or in a

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2010-09-29 16:12:10
UPDATE