Trusted computing

Results: 881



#Item
371Windows Mobile / Smartphones / Windows NT / BIOS / Unified Extensible Firmware Interface / BitLocker Drive Encryption / Windows Phone / Microsoft SharePoint / Trusted Platform Module / Software / Microsoft Windows / Computing

The information contained in this document represents the current view of Microsoft Corp. on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2013-06-04 05:12:25
372Cryptography standards / Trusted computing / Cryptographic software / Trusted Platform Module / Windows XP / PKCS11 / Microsoft CryptoAPI / Security token / Smart card / Microsoft Windows / Cryptography / Computer security

smart security interface virtual smart card Logical Access Client for Trusted Platform Modules Windows, Linux, Mac

Add to Reading List

Source URL: www.charismathics.com

Language: English - Date: 2013-11-21 10:48:12
373Intel / Computing / Trusted Execution Technology / Computer architecture / Instruction set architectures / Bloomfield / Itanium / Computer hardware / Xeon / Intel Core

Intel® Xeon® Processor E5 v2 Product Family Datasheet- Volume Two: Registers March[removed]Reference Number: [removed]

Add to Reading List

Source URL: www.intel.de

Language: English - Date: 2014-03-04 00:23:45
374Computing / VCloud / Virtual machine / NetApp / VMware ESX / EMC NetWorker / System software / VMware / Software

TRUSTED> TO PROTECT YOUR DATA[removed]Powered by Profitability.net

Add to Reading List

Source URL: appica.com

Language: English - Date: 2012-10-12 16:19:08
375Trusted computing / Cryptography / Virtual machines / Business law / Copyright law / Trusted Platform Module / Cloud computing / Grid computing / VMware / System software / Computer security / Software

CHAPTER 1 INTRODUCTION 1.1

Add to Reading List

Source URL: eprints.utm.my

Language: English - Date: 2012-07-15 20:40:51
376Data / Computer network security / Trusted computing / Internet protocols / StrongSwan / Trusted Network Connect / IF-MAP / Trusted Computing Group / Internet Key Exchange / Computer security / Computing / Cryptographic protocols

The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment Andreas Steffen ITA Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil CH-8640 Rapper

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2012-08-29 15:32:53
377Disk encryption / Cryptographic software / Windows Vista / Windows Server / Trusted computing / BitLocker Drive Encryption / Encrypting File System / Trusted Platform Module / Data security / Microsoft Windows / Software / System software

Secure Startup – Full Volume Encryption: Executive Overview - 8 Secure Startup – Full Volume Encryption: Executive Overview

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2006-06-22 16:02:52
378Out-of-band management / Intel vPro / Intel / X86 virtualization / Multi-channel memory architecture / Platform Controller Hub / Trusted Execution Technology / Intel AMT versions / Centrino / Computer hardware / System software / Computing

Platform brief Intel® Core™ i7 and Core™ i5 processors with Intel® QM67 Express and Intel® HM65 Express Chipsets Embedded Computing

Add to Reading List

Source URL: download.intel.com

Language: English - Date: 2011-01-05 13:27:03
379Identity / Computer security / ISO standards / Ubiquitous computing / Smart card / Identity management / Identity document / Online identity / Security token / Security / Computer network security / National Strategy for Trusted Identities in Cyberspace

NSTIC: Facts at a Glance 1. What is the NSTIC? The National Strategy for Trusted Identities in Cyberspace (NSTIC) is an Obama administration initiative

Add to Reading List

Source URL: www.smartcardalliance.org

Language: English - Date: 2011-09-01 10:37:00
380Computing / Wind River Systems / Computer architecture / Tencent QQ / RMI Corporation / Board support package / Software / Real-time operating systems / VxWorks

QQ Technology Goes Global with Wind River VxWorks Startup Network Equipment Company Introduces Trusted Carrier Grade Solution to International Marketplace QQ Technology is a leader in next-generation network

Add to Reading List

Source URL: www.windriver.com

Language: English - Date: 2015-01-18 17:43:00
UPDATE