Trusted system

Results: 509



#Item
131Immunology / Immune system / Respiratory diseases / Type 1 hypersensitivity / Food allergy / Allergy / Allergen / Anaphylaxis / Allergic rhinitis / Medicine / Health / Allergology

GS1 GoScan Trusted data the key to B2C applications A survey conducted by GS1 Australia, with assistance from Anaphylaxis Australia and Nestlé Australia, has shown that accessing a trusted source of data on allergens c

Add to Reading List

Source URL: www.gs1au.org

Language: English - Date: 2012-10-02 04:27:39
132System software / Network management / Simple Network Management Protocol / Network switch / Trusted Platform Module / Router / Server / Tor / Virtual private network / Computing / Internet / Internet privacy

NetQuery: A Knowledge Plane for Reasoning about Network Properties Alan Shieh Emin Gün Sirer

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2011-08-20 15:34:04
133Remote desktop / Trusted computing / Trusted Platform Module / X Window System / Trusted Execution Technology / Google Chrome OS / Thin client / Desktop virtualization / Hyper-V / Software / System software / Computing

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems Lorenzo Martignoni,∗ Pongsin Poosankam,∗† Matei Zaharia,∗ Jun Han,† Stephen McCamant,∗ Dawn Song,∗ Vern Paxson,∗ Adrian Perri

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2014-02-02 20:47:34
134National security / Computer network security / Electronic commerce / Secure communication / Multilevel security / Trusted computing base / Operating system / Kernel / Ring / Computer security / Security / Crime prevention

A Model of Security for Distributed Systems August 28, 1995 4:06 pm A New Model of Security for Distributed Systems Wm A. Wulf

Add to Reading List

Source URL: legion.virginia.edu

Language: English - Date: 1998-12-07 09:06:04
135MINIX / Trusted Computer System Evaluation Criteria / Rainbow Series / Trusted computing base / Operating system / Trusted system / Discretionary access control / Andrew S. Tanenbaum / Ring / Computer architecture / Computer security / Computing

Trusted MINIX: A Worked Example Albert L. Donaldson ESCOM Corporation[removed]Waples Mill Road Oakton, VA 22124

Add to Reading List

Source URL: www.escom.com

Language: English - Date: 2006-07-19 10:32:27
136Malware / Trusted Computing / One-time password / Phishing / System software / Cybercrime / Computer security / Crimeware

Proceedings Template - WORD

Add to Reading List

Source URL: anil.recoil.org

Language: English - Date: 2013-09-29 14:14:18
137BIOS / Boot loaders / USB flash drive / Parallel ATA / Trusted Platform Module / Universal Serial Bus / Secure Digital / USB mass-storage device class / Windows Vista / Computer hardware / Computing / Booting

Dell™ Latitude™ E5400 Discrete Service Manual  Working on Your Computer Adding and Replacing Parts Specifications Diagnostics System Setup

Add to Reading List

Source URL: www.levnapc.cz

Language: English - Date: 2014-07-21 19:03:19
138Tensegrity / Tensile architecture / Muscular system / Animal anatomy / Fascia / Connective tissue / Skeleton / Tissue / Jutsu / Anatomy / Biology / Buckminster Fuller

AMATSU An age old trusted heritage of life skills that develops balance and wellness in to your lifestyle. TAI JUTSU – Natural Movement Heritage

Add to Reading List

Source URL: www.amatsu.co.uk

Language: English - Date: 2005-09-21 17:41:27
139Software / Webroot Software / Avira / Sophos / Symantec / Trend Micro / Malware / Webroot Internet Security Complete / Webroot Internet Security Essentials / Antivirus software / Computer security / System software

WHITE PAPER > HOW RESELLERS CAN BECOME THE TRUSTED ADVISORS How Resellers Can Become the Trusted Advisors on Security Issues Boosting Customer Satisfaction and Loyalty with Superior Antivirus Protection

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2015-02-25 14:11:16
140Software bugs / X86 architecture / Trusted Execution Technology / Trusted computing / Rootkit / Malware / X86 virtualization / Buffer overflow / Intel / System software / Computer security / Computing

Mitigating Exploits, Rootkits and Advanced Persistent Threats David Durham, Senior Principal Engineer Intel Corporation

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2014-08-10 23:56:01
UPDATE