Trusted Computing

Results: 881



#Item
621ESET NOD32 / Microsoft Windows / ESET / Computing / Antivirus software / Software / System software

www.eset.com Become an ESET Managed Service Provider Proven. Trusted.

Add to Reading List

Source URL: static3.esetstatic.com

Language: English - Date: 2013-03-01 03:51:41
622X86 architecture / Out-of-band management / Intel vPro / Trusted computing / Intel Active Management Technology / Intel / Trusted Execution Technology / X86 virtualization / AES instruction set / Computing / System software / Computer architecture

September[removed]Real-World Guide Enterprise Mobile Security: 4th Generation Intel® Core™

Add to Reading List

Source URL: mobilecomputing.crn.com

Language: English - Date: 2014-04-08 16:16:44
623Out-of-band management / Computer hardware / Intel vPro / Intel Active Management Technology / Intel / Trusted Execution Technology / X86 virtualization / AES instruction set / Intel AMT versions / System software / X86 architecture / Computing

Sales Brief Top Reasons to Standardize on 4th Gen Intel® Core™ vPro™ Processor Family INTEL® CORE™ vPRO™ PROCESSOR-BASED BUSINESS CLIENTS DELIVER A COLLECTIVE SOLUTION FOR ENTERPRISE-READY SECURITY AND

Add to Reading List

Source URL: arcade.intel.com

Language: English - Date: 2014-04-29 19:40:22
624Cryptography / Open Vulnerability and Assessment Language / TPM / Trusted Computing Group / Trusted Execution Technology / Computer security / Trusted computing / Trusted Platform Module

OVAL + The Trusted Platform Module Charles Schmidt June 14, 2010 © 2008 The MITRE Corporation. All rights reserved

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2010-06-16 09:55:57
625National security / Trusted computing base / Trusted Computing / Internet privacy / Public safety / Multilevel security / Security / Computer security / Crime prevention

Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection Petros Maniatis† , Devdatta Akhawe∗ , Kevin Fall† , Elaine Shi∗‡ , Stephen McCamant∗ , Dawn Song∗ ‡ PARC, ∗ UC Berkel

Add to Reading List

Source URL: scrub.cs.berkeley.edu

Language: English - Date: 2012-01-11 13:39:10
626X86 architecture / Intel / Cloud computing / Rootkit / McAfee / X86 virtualization / Malware / Intel vPro / Intel Active Management Technology / System software / Computing / Computer security

Introducing the Intel Science and Technology Center for Secure Computing Abstract Suppose all your personal and professional digital devices could interact on your behalf, like trusted agents. Imagine having confidence t

Add to Reading List

Source URL: scrub.cs.berkeley.edu

Language: English - Date: 2011-10-21 01:32:09
627Remote desktop / Trusted computing / Trusted Platform Module / X Window System / Trusted Execution Technology / Google Chrome OS / Thin client / Desktop virtualization / Hyper-V / Software / System software / Computing

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems Lorenzo Martignoni,∗ Pongsin Poosankam,∗† Matei Zaharia,∗ Jun Han,† Stephen McCamant,∗ Dawn Song,∗ Vern Paxson,∗ Adrian Perri

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2014-10-02 07:34:55
628Computing / Out-of-band management / Intel vPro / Intel Active Management Technology / Intel / Trusted Execution Technology / AES instruction set / X86 virtualization / McAfee / System software / X86 architecture / Computer architecture

Sales Brief Intel and McAfee 2013 Security Benefits Intel and McAfee deliver a new level of strengthened security innovation utilizing embedded hardware security technologies for unprecedented protection and

Add to Reading List

Source URL: mobilecomputing.crn.com

Language: English - Date: 2014-04-08 16:09:09
629Computer hardware / ISCSI / Fibre Channel over Ethernet / Emulex / Data center bridging / Host adapter / 10 Gigabit Ethernet / Fibre Channel / Storage area network / Ethernet / Computing / OSI protocols

D ATA S H E E T OneConnect® OCe11102-F 10Gb Ethernet Universal Converged Network Adapter Simplified Networking, Trusted SAN Interoperability and Increased Business Agility

Add to Reading List

Source URL: www.cisco.com

Language: English
630Outsourcing / Cloud infrastructure / Cloud storage / Trusted Computing / NP / Cloud computing / Centralized computing / Computing

Verifiable Resource Accounting for Cloud Computing Services Vyas Sekar Petros Maniatis

Add to Reading List

Source URL: scrub.cs.berkeley.edu

Language: English - Date: 2012-01-11 13:39:09
UPDATE