Trusted system

Results: 509



#Item
301System software / DMZ / Information security / Server / Active Directory / Password / Operating system / Network security / Computer network security / Computing / Security

Information Technology Services Effective Date: January 21, 2003 Revised Date: [removed], [removed]; [removed]Servers in Trusted Area Information Security Procedure

Add to Reading List

Source URL: www.unmc.edu

Language: English - Date: 2013-01-17 15:23:02
302DNSSEC / Domain Name System Security Extensions / Domain name system / Key management / National Strategy for Trusted Identities in Cyberspace / Interoperability / OpenID / International Organization for Standardization / Computing / Internet / Identity

Microsoft Word - nstic3.docx

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-08-05 20:52:40
303POSIX / The Open Group / Unix / X Window System / National Strategy for Trusted Identities in Cyberspace / Open standard / System software / Interoperability / Software / Standards organizations / Computing / Consortia

Microsoft Word - Open Group_NSTIC NOI Response final.docx

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-28 11:56:06
304Security / Cyberwarfare / National Strategy for Trusted Identities in Cyberspace / Healthcare in the United States / Inova Health System / Identity management / Digital identity / Healthcare Information and Management Systems Society / Office of the National Coordinator for Health Information Technology / Computer network security / Computer security / Identity

NSTIC, ONC, and Inova: Trusted Identities for Health IT February 25, 2014 Jeremy Grant, National Strategy for Trusted Identities in Cyberspace (NSTIC)

Add to Reading List

Source URL: himss.files.cms-plus.com

Language: English - Date: 2014-02-25 08:51:08
305Geography of Germany / Sadeghi / Ruhr University Bochum / Reza / Ruhr / States of Germany / Bochum / North Rhine-Westphalia

Ahmad-Reza Sadeghi, Ruhr-University Bochum © Trusted Virtual Domains: Towards Trustworthy Distributed Services Ahmad-Reza Sadeghi System Security Lab

Add to Reading List

Source URL: www.preciosa-project.org

Language: English - Date: 2010-07-20 08:09:58
306Computing / Out-of-band management / Intel vPro / Intel Active Management Technology / Intel / Trusted Execution Technology / AES instruction set / X86 virtualization / McAfee / System software / X86 architecture / Computer architecture

Sales Brief Intel and McAfee 2013 Security Benefits Intel and McAfee deliver a new level of strengthened security innovation utilizing embedded hardware security technologies for unprecedented protection and

Add to Reading List

Source URL: smb.intel.in

Language: English - Date: 2013-08-23 21:00:30
307Cloud computing / Virtual machines / Data center / Hypervisor / Virtualization / Trusted Execution Technology / Hyper-V / IBM cloud computing / Intelligent workload management / System software / Computing / Software

Solution Brief HyTrust® Boundary Controls: Policy-based Control for Virtual Workloads Summary

Add to Reading List

Source URL: www.hytrust.com

Language: English - Date: 2014-09-18 14:50:40
308Old age / Healthcare / Nursing / Family / Home care / Caregiver / Nursing home / Assisted living / Health care / Medicine / Health / Geriatrics

SwedishAmerican Home Services is part of SwedishAmerican Health System, a trusted provider of healthcare services in northern Illinois for nearly 100 years.

Add to Reading List

Source URL: www.swedishamerican.org

Language: English - Date: 2013-07-02 22:37:49
309Airline ticket / Issue tracking system / Traffic ticket / Tickets / Transport / Law

Ticket Splitting The Most Trusted Software in the Damage Prevention Industry Ticket Splitting can be applied when a municipality or company receives a ticket from a One Call Center and needs multiple departments to locat

Add to Reading List

Source URL: www.korterra.com

Language: English - Date: 2014-11-21 15:55:43
310Email / Financial regulation / Locate / Short selling

Attachments The Most Trusted Software in the Damage Prevention Industry In addition to responding to a locate request through a ticket management system, many locators are using pictures, videos or other documents to hel

Add to Reading List

Source URL: www.korterra.com

Language: English - Date: 2014-11-21 15:55:44
UPDATE