Trusted Computing

Results: 881



#Item
691National security / Evaluation / Trusted computing base / Trusted system / Operating system / Protection mechanism / Multilevel security / XTS-400 / Computer security / Security / Crime prevention

Proposed Technical Evaluation for Trusted Computer Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-15 15:50:40
692Crime / Email / Computer crimes / Social engineering / Confidence tricks / Phishing / Identity theft / Spam / Email spam / Spamming / Internet / Computing

PHISHING - WHAT TO DO IF YOU HAVE BEEN HOOKED Phishing is when someone tries to trick you, by phone or through the Internet, into providing personal information. They may pretend to be from trusted financial institutions

Add to Reading List

Source URL: www.michigan.gov

Language: English - Date: 2014-03-26 15:53:28
693Computer network security / Web hosting / Hypervisor / Cloud infrastructure / Virtual private server / Hyper-V / Computer security / IBM cloud computing / Cloud computing / System software / Computing

DRAFT NISTIR 7904, Trusted Geolocation in the Cloud: Proof of Concept Implementation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-25 16:01:14
694Intel / Health Insurance Portability and Accountability Act / Computing / Technology / Information technology management / Intel AMT versions / Trusted Execution Technology / Out-of-band management / Intel vPro / Intel Active Management Technology

Client Technologies that Help Assist with Security and Privacy Regulation Compliance David Houlding, Intel Corporation Edward J. Herold, Intel Corporation

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:54
695Incident management / Firefighting in the United States / Virtual reality / Management systems / Social information processing / InciWeb / Skype / Social media / Incident Command System / Software / Computing / Emergency management

St. Denis et al. Trial by Fire: Deployment of Trusted Digital Volunteers Trial by Fire: The Deployment of Trusted Digital Volunteers in the

Add to Reading List

Source URL: www.nifc.gov

Language: English - Date: 2012-03-19 10:04:32
696Trusted Computing Group / Trusted Execution Technology / Open Vulnerability and Assessment Language / Total productive maintenance / Direct TPMS / Computer security / Trusted computing / Trusted Platform Module

Using the Trusted Platform Module to Enhance OVAL Driven Assessments

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2011-03-24 06:59:43
697Computer network security / Solaris Trusted Extensions / Solaris / Kerberos / Sun Microsystems / Pluggable authentication module / SunOS / Security-focused operating system / Trusted operating system / Software / Computing / System software

There and Back Again – A Solaris Security Tale Glenn Brunette Distinguished Engineer Sun Microsystems, Inc.

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2012-07-31 09:52:12
698Crime prevention / National security / BIOS / Trusted computing / Trusted Platform Module / Federal Information Security Management Act / Information security / Integrity / Unified Extensible Firmware Interface / Security / Computer security / Computing

NIST SP[removed], BIOS Integrity Measurement Guidelines (Draft)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-25 15:29:15
699Cyberwarfare / Trusted Network Connect / IF-MAP / Trusted Computing Group / Lumeta Corporation / Network security / Security Content Automation Protocol / Computer security / Computer network security / Trusted computing

Security Coordination with IF-MAP Matt Webster, Lumeta 28 Sept 2010 Copyright © 2010 Trusted Computing Group

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:54
700Trusted computing / Trusted Execution Technology / x86 architecture / Intel / Trusted Computing Group / Ring / Malware / Intel vPro / Computer security / Computer hardware / Computing

Bringing The Trust Back Into Cyber Space: Extending Intel’s commitment to Security Steve Pawlowski Intel Senior Fellow

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:53
UPDATE