API Security

Results: 194



#Item
81Gernot Heiser / Capability-based security / Kernel / Interrupt request / Embedded system / ARM architecture / Computer architecture / L4 microkernel family / Instruction set architectures

Trustworthy Embedded Systems http://www.ertos.nicta.com.au/ seL4 Reference Manual For v3 development branch API version 1.2(r2)

Add to Reading List

Source URL: www.cse.unsw.edu.au

Language: English - Date: 2014-07-29 08:23:40
82Desktop publishing software / Graphic design / K4 / Workflow technology / Adobe InDesign / Workflow / Adobe InCopy / Adobe Systems / Portable Document Format / Publishing / Software / Computing

Userstory Infel Corporate Media Keywords: Automation, Tablet Publishing, Workflow, Employee Magazines, Customer Magazines, Annual Reports, IT Security, Virtualization, Process Optimization, API / Interface, Terminal Ser

Add to Reading List

Source URL: www.vjoon.com

Language: English - Date: 2014-07-10 10:36:52
83Akamai Technologies / Content delivery network / Performance management / System administration / Software as a service / Business transaction management / IBM cloud computing / Application firewall / Cloud computing / Computing / Centralized computing

PRODUCT BRIEF Cloud Monitor A Cloud-based API solution that puts critical transaction and security event data at your fingertips As you migrate an increasing number of applications and services to the Cloud, more of you

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2013-10-01 04:06:01
84

SecretAgent® DAS 1.7 HSM Proxy Architecture Diagram Copyright© [removed]Information Security Corp. All rights reserved. HSM’s PKCS#11 API HSM

Add to Reading List

Source URL: www.infoseccorp.com

- Date: 2008-04-30 20:01:00
    85Cross-platform software / Java programming language / Java platform / Computing platforms / Java / Application programming interface / Windows API / Windows Registry / Thread / Computing / Computer programming / Software engineering

    To appear in IEEE Security and Privacy, Oakland, CA. May 9-12, [removed]Flexible Policy-Directed Code Safety David Evans [removed]

    Add to Reading List

    Source URL: naccio.cs.virginia.edu

    Language: English - Date: 1999-10-27 18:22:23
    86Java / Application programming interface / Computer security / Computing / Java programming language / Windows API

    Policy-Directed Code Safety by David E. Evans S.B. Massachusetts Institute of Technology[removed]S.M. Massachusetts Institute of Technology (1994)

    Add to Reading List

    Source URL: www.cs.virginia.edu

    Language: English - Date: 1999-11-11 08:42:34
    87Business / Credit cards / Economics / Computer law / Eway / Payment Card Industry Data Security Standard / Qualified Security Assessor / Acquiring bank / SecurityMetrics / Payment systems / Electronic commerce / Data privacy

    EWAY RAPID API Review of the eWAY API with respect to PCI DSS 3.0 This letter is to state that BAE Systems Applied Intelligence as a qualified security assessor company (QSAC) has reviewed the eWAY API solution with resp

    Add to Reading List

    Source URL: eway.io

    Language: English - Date: 2015-03-23 00:17:40
    88Threads / Computer virus / Thread-local storage / Antivirus software / Thread / Portable Executable / Windows API / Callback / Ada / Computing / System software / Software

    4 • VIRUS BULLETIN JUNE[removed]VIRUS ANALYSIS Unexpected Resutls [sic] Peter Ferrie Symantec Security Response, Australia

    Add to Reading List

    Source URL: pferrie.host22.com

    Language: English
    89Computer network security / Key management / Kerberos / Generic Security Services Application Program Interface / Single sign-on / Ticket Granting Ticket / Key distribution center / Cryptographic protocols / Generic Security Service Algorithm for Secret Key Transaction / Computer security / Computing / Cryptography

    Simplify enterprise Java authentication with single sign-on Design secure client/server Java applications that use GSS-API and Kerberos tickets to implement SSO Faheem Khan ([removed]) Consultant

    Add to Reading List

    Source URL: www.ibm.com

    Language: English - Date: 2013-09-18 06:43:11
    90Windows NT architecture / Client/Server Runtime Subsystem / Dynamic-link library / AI / Portable Executable / Native API / Computer viruses / Microsoft Windows library files / Simile / Software / System software / Computing

    VIRUS BULLETIN www.virusbtn.com VIRUS ANALYSIS CAIN AND ABUL Peter Ferrie Symantec Security Response, USA

    Add to Reading List

    Source URL: pferrie.host22.com

    Language: English - Date: 2011-09-27 16:13:20
    UPDATE