Trusted system

Results: 509



#Item
251Transport / Avionics / Aircraft Communications Addressing and Reporting System / ARINC / SELCAL / Airline / American Airlines / American Eagle Airlines / John F. Kennedy International Airport / Aviation / Aircraft instruments / Open Travel Alliance

Success Stories PROVEN TRUSTED RELIABLE American Airlines, the world’s largest scheduled passenger airline, has been using Avtec’s DSPatch console communications system since 1999.

Add to Reading List

Source URL: www.avtecinc.com

Language: English - Date: 2014-02-28 15:37:21
252Unified Extensible Firmware Interface / Computer architecture / Computer hardware / Vmlinux / Trusted computing / Linux / BIOS / Booting / System software

Extending secure boot to user space with Linux Integrity Subsystem Dmitry Kasatkin Integrity subsystem developer/co-maintainer [removed] Samsung Open Source Group

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2014-10-09 09:12:19
253Computer network security / Embedded system / Ring / Operating system / Internet of Things / Integrity / Wireless security / Trusted Platform Module / Secure communication / Computer security / Computing / Security

Embedded Security for Internet of Things Arijit Ukil Jaydip Sen Sripad Koilakonda

Add to Reading List

Source URL: iotsecuritylab.com

Language: English - Date: 2014-08-14 00:16:23
254Computer security / ESET NOD32 / ESET / Malware / Spyware / Avira / Panda Pro / Antivirus software / System software / Software

Stay a Safe Distance from Internet Threats For all your activities, rely on ESET NOD32® technology trusted by millions of users to keep them safe.

Add to Reading List

Source URL: static1.esetstatic.com

Language: English - Date: 2013-12-03 07:30:34
255Inspector General / Mail / Postal system / Philately / United States / Humanities / United States Postal Service / Special agent / United States Postal Inspection Service

MAIL SECURITY For six consecutive years the U.S. Postal Service has been ranked among the top 10 businesses in the country as the “Most Trusted Company for Privacy” according to a national study conducted by the Pone

Add to Reading List

Source URL: www.usps.com

Language: English - Date: 2012-08-31 07:57:03
256X86 architecture / Out-of-band management / Intel vPro / Trusted computing / Intel Active Management Technology / Intel / Trusted Execution Technology / X86 virtualization / AES instruction set / Computing / System software / Computer architecture

September[removed]Real-World Guide Enterprise Mobile Security: 4th Generation Intel® Core™

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2014-11-11 19:10:30
257DS / Structure / International nongovernmental organizations / International Virtual Observatory Alliance / International Council for Science

ICSU World Data System: Trusted Data Services for Global Science Mustapha Mokrane Executive Director International Programme Office

Add to Reading List

Source URL: www.prime-pco.com

Language: English - Date: 2014-11-10 02:38:35
258Knowledge representation / Metadata / Technical communication / Geographic information system / Comparison of Research Networking Tools and Research Profiling Systems / HPCC / Data management / Information / Data

B2DROP is a secure and trusted data exchange service for researchers and scientists to keep their research data synchronized and up-to-date and to exchange with other researchers. An ideal solution to: Store and exchang

Add to Reading List

Source URL: www.eudat.eu

Language: English - Date: 2015-01-05 01:16:42
259Computing / United States Department of Homeland Security / Computer network security / National security / Federal Information Security Management Act / Managed Trusted Internet Protocol Service / NIST Special Publication 800-53 / Information security management system / Einstein / Computer security / Security / Data security

Fiscal Year 2012 Report to Congress on the Implementation of The Federal Information Security Management Act of 2002 March 2013

Add to Reading List

Source URL: www.whitehouse.gov

Language: English - Date: 2013-03-11 11:37:30
260Hyper-V / Hypervisor / Xen / Virtualization / Wi-Fi / VM / Ring / Laptop / Embedded hypervisor / System software / Software / Virtual machines

Enabling Secure Mobile Operations with Commercial Products Grant Wagner Technical Director Trusted Systems Research National Security Agency

Add to Reading List

Source URL: cybersecurity.kennesaw.edu

Language: English - Date: 2014-10-20 10:45:33
UPDATE