Trusted Computing

Results: 881



#Item
451Computer hardware / Intel Core / Intel / Xeon / Trusted Execution Technology / Hyper-threading / X86 virtualization / Intel vPro / Intel Active Management Technology / System software / Computing / X86 architecture

Intel Insights at SC11 Dr. Rajeeb Hazra General Manager Intel Technical Computing Group Illuminate Insight Solve Intel® Technical Computing Group

Add to Reading List

Source URL: newsroom.intel.com

Language: English - Date: 2015-01-29 22:05:35
452Embedded Linux / Smartphones / National Security Agency / Security-Enhanced Linux / Mandatory access control / Android / Linux kernel / Motorola Droid / Privilege escalation / Software / Computing / Computer security

Laying a Secure Foundation for Mobile Devices Stephen Smalley Trusted Systems Research National Security Agency

Add to Reading List

Source URL: www.incose-cc.org

Language: English - Date: 2013-08-29 11:50:21
453Cyberwarfare / Global Information Assurance Certification / Software testing / SANS Institute / Web application security / Programmer / Software engineering / Application security / Vulnerability / Computer security / Computing / Computer network security

SANS Institute was established in 1989 as a cooperative research and education organization. Today, SANS is the most trusted and largest source for information security training and certification in the world. SANS teach

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 18:45:04
454Internet / Indianapolis / HCard / Email / Fishers /  Indiana / Gmail / Geography of Indiana / Indianapolis metropolitan area / Computing

PREFERRED VENDORS When planning your Indianapolis meeting, event or wedding, rest assured as we only use trusted and well respected partners. Presentation Services Audio Visual (PSAV) Joshua Flint-Sales Manager, PSAV Con

Add to Reading List

Source URL: assets.westinindianapolis.com

Language: English - Date: 2014-11-05 13:50:14
455Trusted computing / Cryptography / Trusted Platform Module / Cryptographic software / Direct Anonymous Attestation / Trusted Computing Group / Cloud computing / Virtual machine / VirtualBox / Software / System software / Computer security

The American University in Cairo School of Sciences and Engineering Using Trusted Platform Module for securing virtual environment access in Cloud

Add to Reading List

Source URL: dar.aucegypt.edu

Language: English - Date: 2015-01-15 17:00:14
456Information technology management / Computer security / Agile software development / Software project management / DevOps / Software development process / Release management / Application security / Open-source software / Software development / Software / Computing

EXECUTIVE BRIEF We Make It Easy to Build Trusted Software— and Keep It That Way Over Time

Add to Reading List

Source URL: www.sonatype.com

Language: English
457Evaluation Assurance Level / Protection Profile / Security Target / Trusted computing base / Trusted Computer System Evaluation Criteria / ITSEC / XTS-400 / Cimcor / Computer security / Evaluation / Common Criteria

Common Criteria Common Criteria for Information Technology Security Evaluation

Add to Reading List

Source URL: www.fmv.se

Language: English - Date: 2011-10-24 08:38:46
458Cyberwarfare / Computer network security / Crime prevention / National security / National Institute of Standards and Technology / Federal Information Security Management Act / International Multilateral Partnership Against Cyber Threats / National Cybersecurity Center / National Strategy for Trusted Identities in Cyberspace / Security / Computer security / Computing

Testimony of Charles H. Romine Director Information Technology Laboratory National Institute of Standards and Technology

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-01-27 16:21:14
459Trusted computing / Disk encryption / Trusted Platform Module / Internet protocols / Trusted Computing Group / Secure Shell / Firewall / Network security / Laptop / Computer security / Computing / Computer network security

Initial Tiger Team Report on Potential TPM Vulnerability, and Mitigation Plan Team Members: Peter Leight / Richard Hammer June 2, 2006 Executive Summary:

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 12:08:54
460Internet / Electronics / Email / Computing / Electronic mailing list

Custom Email Program Deliver your message to Elsevier’s readership As one of the most trusted names in medical publishing, Elsevier’s readers include some of the top practicing healthcare professionals in the industr

Add to Reading List

Source URL: www.elsmediakits.com

Language: English - Date: 2014-11-01 09:04:18
UPDATE