Trusted Computing

Results: 881



#Item
421Spamming / Computing / Internet / DomainKeys Identified Mail / Email filtering / Email spam / Challenge–response spam filtering / Email authentication / Email / Spam filtering / Computer-mediated communication

Trusted Message Delivery for SaaS-based CRM Systems Overview With Trusted Message Delivery for software-as-a-service(SaaS) CRM systems, we deploy one or more specially configured Sentrions either on your premises or in a

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2010-09-29 16:12:10
422Cloud infrastructure / Cloud storage / Data center / Computer security / Cloud computing / Computing / Centralized computing

G-Cloud Linux-asa-Service Secure Management of a Linux Server platform The trusted way to deploy your Linux Servers Built on Sentinel by SCC’s Infrastructure-as-a-Service, our Linux service provides pre-accredited and

Add to Reading List

Source URL: www.scc.com

Language: English - Date: 2014-10-14 06:18:51
423Smartphones / Nokia / Ovi / Dell / Nivea / Hewlett-Packard / Computing / Technology / Electronics

EUROPEAN TRUSTED BRANDS[removed]SAMSUNG BUILDS TRUST ACROSS EUROPE NIVEA REMAINS MOST TRUSTED BRAND IN ALL COUNTRIES IN THE 14TH READER’S DIGEST TRUSTED BRANDS SURVEY London March 2014

Add to Reading List

Source URL: www.rdtrustedbrands.com

Language: English - Date: 2014-02-21 05:40:10
424Software testing / Computer network security / Information technology audit / Global Information Assurance Certification / SANS Institute / Penetration test / Department of Defense Cyber Crime Center / Malware / Certified Information Systems Security Professional / Computer security / Cyberwarfare / Computing

THE MOST TRUSTED NAME IN INFORMATION AND SOFTWARE SECURITY TRAINING Baltimore 2014 Baltimore, MD September 22-27

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2014-06-23 10:39:59
425Computing / Software testing / Global Information Assurance Certification / Penetration test / Information technology audit / SANS Institute / Metasploit Project / Computer forensics / Network security / Computer security / Cyberwarfare / Computer network security

THE MOST TRUSTED NAME IN INFORMATION AND SOFTWARE SECURITY TRAINING Seattle 2014 Seattle, WA Sept 29 - Oct 6

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2014-06-23 11:03:36
426Trusted Computer System Evaluation Criteria / Trusted computing / CTCPEC / ITSEC / Trusted computing base / Mandatory access control / Common Criteria / XTS-400 / Computer security / Evaluation / National Security Agency

A Comparison of Computer Security Evaluation Criteria[removed]Software Engineering Thesis Michael Papasimeon

Add to Reading List

Source URL: speakerd.s3.amazonaws.com

Language: English - Date: 2015-01-07 00:22:22
427Trusted computing / Disk encryption / Trusted Platform Module / Internet protocols / Trusted Computing Group / Secure Shell / Firewall / Network security / Laptop / Computer security / Computing / Computer network security

Initial Tiger Team Report on Potential TPM Vulnerability, and Mitigation Plan Team Members: Peter Leight / Richard Hammer June 2, 2006 Executive Summary:

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 18:45:06
428OpenForum Europe / Cloud / St. Cloud /  Minnesota / Cloud communications / IICCRD / Cloud computing / Centralized computing / Computing

White Paper Trusted Cloud for the Enterprise –what are the key factors today? 1

Add to Reading List

Source URL: www.openforumacademy.org

Language: English - Date: 2014-11-04 04:21:29
429Smartphones / Multi-touch / IOS / ITunes / Mobile device management / IPhone / IPad / Cloud computing / SyncShield / Computing / Software / Apple Inc.

Using Apple iOS within the secure Government world The trusted way to deploy Apple iOS Our G-Cloud Mobile Device Management (MDM) Service for Apple iOS will transform the management of your Apple estate. The CESG-complia

Add to Reading List

Source URL: www.scc.com

Language: English - Date: 2014-10-14 06:18:59
430Cloud infrastructure / Cloud storage / Data center / IICCRD / IBM cloud computing / Cloud computing / Computing / Centralized computing

G-Cloud Infrastructureas-a-Service Secure scalable pay as you use cloud services The trusted way to deploy your IT Not all Infrastructure-as-a-Service (IaaS) is the same. As a buyer you should take great care in selectin

Add to Reading List

Source URL: www.scc.com

Language: English - Date: 2014-10-14 06:18:48
UPDATE