Trusted computing

Results: 881



#Item
571International Multilateral Partnership Against Cyber Threats / Internet / Email / Computing / Knowledge / Department of Defense Cyber Crime Center / Computer crimes / Information sharing / Terminology

Trusted Automated eXchange of Indicator Information — TAXII™ Enabling Cyber Threat Information Exchange TAXII defines a set of services and message exchanges that, when implemented, enable sharing of actionable cybe

Add to Reading List

Source URL: makingsecuritymeasurable.mitre.org

Language: English - Date: 2013-07-08 10:01:54
572Public safety / Standards organizations / Government / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / National Institute of Standards and Technology / National Strategy for Trusted Identities in Cyberspace / United States Department of Homeland Security / Cloud computing / Computer network security / Security / Computer crimes

Update on the Cybersecurity Framework July 31, 2014 The Framework for Improving Critical Infrastructure Cybersecurity (“The Framework”) was issued on February 12, 2014, as directed by the President in Executive Order

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2014-07-31 16:13:52
573Software / Trusted computing / Disk encryption / Trusted Platform Module / Trusted Computing Group / Data management / Computer security / Microsoft Access

DOC Document

Add to Reading List

Source URL: www.trainfo.com

Language: English - Date: 2013-11-08 14:05:13
574Trusted computing / Microsoft Access / Computer file / Disk encryption / Cryptographic software / Trusted Platform Module / Trusted Computing Group / Computer security / Data management / Computing

DOC Document

Add to Reading List

Source URL: www.trainfo.com

Language: English - Date: 2013-11-08 14:05:12
575Technology / GfK / Advertising / Twitter / Facebook / Mad / World Wide Web / Social media / Computing

Magazine media deliver powerful relationships that influence, inspire and endure. The magazine media brand experience is based on trusted editorial, complemented by relevant advertising. This dual immersion in edit and a

Add to Reading List

Source URL: www.magazine.org

Language: English - Date: 2013-12-18 11:26:57
576Telcordia LERG Routing Guide / Trusted computing

DOC Document

Add to Reading List

Source URL: www.trainfo.com

Language: English - Date: 2013-11-08 14:05:12
577Trusted computing / Microsoft Access / Microsoft Office / Disk encryption / Windows Vista / Trusted Computing Group / Trusted Platform Module / Software / Computing / Computer security

DOC Document

Add to Reading List

Source URL: www.trainfo.com

Language: English - Date: 2013-11-08 14:05:13
578Java platform / Cross-platform software / Java Platform /  Micro Edition / Java / Connected Device Configuration / OSGi / NetBeans / Linux / Oracle Corporation / Computing / Software / Computing platforms

ORACLE DATA SHEET ORACLE JAVA MICRO EDITION EMBEDDED CLIENT PROVEN AND TRUSTED TECHNOLOGY KEY FEATURES & BENEFITS

Add to Reading List

Source URL: www.oracle.com

Language: English
579Technical communication / Information / Identity management / Extensible Resource Identifier / Computing / OASIS / Markup languages

www.oasis-open.org The OASIS IDtrust (Identity and Trusted Infrastructure) Member Section

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2007-04-18 07:51:58
580Computer hardware / Unified Extensible Firmware Interface / Trusted Platform Module / Trusted Computing Group / Personal computer hardware / Hardware-based full disk encryption / Insyde Software / IEEE / EFI System partition / BIOS / System software / Computing

presented by Strategies for Firmware Support of Self-Encrypting Drives UEFI Winter Plugfest – February 21-23, 2011 Presented by Jeff Bobzin

Add to Reading List

Source URL: www.uefi.org

Language: English - Date: 2013-09-24 15:24:27
UPDATE