Trusted computing

Results: 881



#Item
561Information appliances / Electronic commerce / Mobile Web / Tablet computer / Smartphone / Mobile / Mobile ticketing / Technology / Mobile technology / Computing

Mobile KorWeb The Most Trusted Software in the Damage Prevention Industry Mobile KorWeb is the mobile version of KorTerra’s Web-based software, KorWeb. This allows KorWeb users with a smartphone or tablet the ability t

Add to Reading List

Source URL: www.korterra.com

Language: English - Date: 2014-11-21 15:55:44
562Markup languages / Cloud clients / Portable software / HTML / Same origin policy / Cross-site scripting / Trusted computing base / JavaScript / Ring / Software / Computing / Google Chrome

Privilege Separation in HTML5 Applications Devdatta Akhawe, Prateek Saxena, Dawn Song University of California, Berkeley {devdatta,prateeks,dawnsong}@cs.berkeley.edu Abstract

Add to Reading List

Source URL: devd.me

Language: English - Date: 2014-11-09 00:08:12
563Public safety / Computing / Computer law / Federal Information Security Management Act / National Institute of Standards and Technology / NIST Special Publication 800-53 / Managed Trusted Internet Protocol Service / Computer security / Security / Data security

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C[removed]

Add to Reading List

Source URL: www.whitehouse.gov

Language: English - Date: 2013-11-18 16:51:47
564Antivirus software / Microsoft Forefront / Windows Server / Microsoft SharePoint / Azure Services Platform / Microsoft Security Essentials / Microsoft Online Services / Microsoft Office / Computer security / Software / Computing / System software

Microsoft technology solutions for cybersecurity For every phase of this security management life cycle, Microsoft provides trusted advice and technology solutions that play a critical role in helping to ensure the safet

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2010-08-12 23:02:09
565Computing / Cyberwarfare / Security / Automation / Malware / Security event manager / Trusted Network Connect / Security information and event management / IF-MAP / Computer security / Computer network security / Trusted computing

Emerging Topics Engineering Session Emerging Topics  CEE

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:55
566Cryptography / Open Vulnerability and Assessment Language / Trusted Computing Group / Trusted Execution Technology / Computer security / Trusted computing / Trusted Platform Module

Trusted Computing in OVAL Charles Schmidt March 24, 2011 HS SEDI is a trademark of the U.S. Department of Homeland Security. © 2011 The MITRE Corporation. All Rights Reserved.

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:32:01
567National security / Computing / Data security / Computer network security / Information security / Trusted Computer System Evaluation Criteria / Application security / Internet of Things / Security / Computer security / Crime prevention

SEVENTH FRAMEWORK PROGRAMME

Add to Reading List

Source URL: www.compose-project.eu

Language: English - Date: 2014-07-31 05:25:05
568Telecommunications / Cloud infrastructure / Software as a service / Software distribution / Provisioning / Service delivery platform / IBM cloud computing / Enomaly Inc / Cloud computing / Centralized computing / Computing

Parallels Automation White Paper Parallels Automation – Trusted by Top Service Providers Worldwide

Add to Reading List

Source URL: sp.parallels.com

Language: English - Date: 2014-06-17 16:20:17
569Federal Information Security Management Act / Cyberwarfare / Risk management framework / Cloud computing / Information security / Security controls / NIST Special Publication 800-53 / Managed Trusted Internet Protocol Service / Computer security / Security / Computing

Federal Risk and Authorization Management Program (FedRAMP) – From the FedRAMP PMO, CSP, and 3PAO Perspective

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-06-04 17:37:34
570Cyberwarfare / Network Access Control / Trusted Network Connect / Windows XP / Trusted Computing / IF-MAP / Network security / Computer network security / Computer security / Computing

Network Security Automation Standards: TNC and SCAP Copyright © 2011 Trusted Computing Group Trusted Network Connect

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:32:04
UPDATE