Computer security

Results: 47159



#Item
871Security / Engineering / Occupations / Systems engineering / Systems integrator / Iron Dome / Computer security / Reliability engineering

CONNECTING THE DOTS mPrest is a leading-edge global provider of mission-critical monitoring and control technology and solutions, enabling the integration of multiple complex systems that reduce project development time,

Add to Reading List

Source URL: www.mprest.com

Language: English - Date: 2015-10-19 16:55:50
872Computing / Information technology / Data management / Data / Business intelligence / Big data / Computer security / Formal sciences / Threat / Analytics / Data warehouse

Solutions Threat Intelligence Vanquish Digital Threats: Internal

Add to Reading List

Source URL: www.koverse.com

Language: English - Date: 2015-09-29 12:19:29
873Security / Computer security / Compact Disc and DVD copy protection / Arxan Technologies / Copyright law / Prevention / Warez / Cryptography

Securing DRM and Multimedia Applications through Guard Technology Arxan Technologies White Paper – Arxan protects your IP from software piracy, tampering, reverse engineering and any manner of theft.

Add to Reading List

Source URL: www.arxan.com

Language: English - Date: 2016-08-01 23:57:15
874Computer access control / Computer security / Identity management / Federated identity / Shibboleth / IDM / Security Assertion Markup Language / Authentication

Report Market Analysis of IdM Solutions for Swiss edu-ID Name Surname Job Title Document Type:

Add to Reading List

Source URL: projects.switch.ch

Language: English - Date: 2016-07-14 11:47:46
875Computing / IEEE 802.11 / Wireless networking / Computer network security / Protected Extensible Authentication Protocol / Wi-Fi Protected Access / Control Panel / Wi-Fi / Extensible Authentication Protocol / Wireless security

Get Connected with KSU WiFi – Windows 7 Note: Windows Wireless Manager must be enabled. KSU Service Desk Faculty & Staff: Students:

Add to Reading List

Source URL: uits.kennesaw.edu

Language: English - Date: 2015-11-25 10:43:55
876Technology / Security / Prevention / National security / E-commerce / Crime prevention / Mobile telecommunications / Mobile phone / New media / Computer security

Electronic Stores What should I consider suspicious? Suspicious People What should I do? Be part of the solution.

Add to Reading List

Source URL: www.homelandsecurity.ohio.gov

Language: English - Date: 2013-01-30 08:13:52
877Computer access control / Computer security / Access control / Password / Security / Login / Identity management / Password strength / Password management

Nissan Tech Info Dealer User Guide Version 4.0 Date Copyright© 2014 by Nissan Motor, Ltd.

Add to Reading List

Source URL: www.nissan-techinfo.com

Language: English - Date: 2014-09-23 13:56:51
878Computing / Data security / Anomaly detection / Data mining / Computer programming / Cloud computing / Cloud storage / Tracing / Data lineage / CELAR

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-12 08:36:52
879Prevention / Safety / Business / Computer security / Crime prevention / Cryptography / Data security / Information security / National security / Occupational safety and health / BlackBerry Limited

VISION o f t h e C O M P AN Y RMS, a.s. Košice

Add to Reading List

Source URL: www.rms-kosice.sk

Language: English - Date: 2014-05-06 05:28:33
880Computer security / Security / Cyberwarfare / Computing / Federally Funded Research and Development Centers / National Cybersecurity Center of Excellence / Mitre Corporation / International Multilateral Partnership Against Cyber Threats / National security / Michigan Cyber Range / National Cybersecurity FFRDC

2015 ELECTRICAL AND COMPUTER ENGINEERING CURRENTS www.ece.udel.edu

Add to Reading List

Source URL: www.ee.udel.edu

Language: English - Date: 2015-11-02 16:42:25
UPDATE