Digital security

Results: 4317



#Item
111North Carolina Office of the Governor North Carolina Office of Information Technology Services North Carolina Department of Cultural Resources Best Practices for State Agency Social Media Usage in North Carolina Version

North Carolina Office of the Governor North Carolina Office of Information Technology Services North Carolina Department of Cultural Resources Best Practices for State Agency Social Media Usage in North Carolina Version

Add to Reading List

Source URL: digitalpreservation.ncdcr.gov

Language: English - Date: 2016-05-02 15:16:04
112NVR Manual Welcome to use our network video recorder. For your secure using, please read this user manual carefully. The following contents are about the proper use of the product, the prevention of danger and loss of pr

NVR Manual Welcome to use our network video recorder. For your secure using, please read this user manual carefully. The following contents are about the proper use of the product, the prevention of danger and loss of pr

Add to Reading List

Source URL: www.lowcost-security.ch

Language: English - Date: 2015-04-20 07:28:40
113Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro1 , Steven Goldfeder2 , and Arvind Narayanan2 1  City College, City University of New York

Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro1 , Steven Goldfeder2 , and Arvind Narayanan2 1 City College, City University of New York

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-01-26 19:57:17
114Technology / Computing / Media technology / Digital media / Geert Lovink / XS4ALL / Internet / E-democracy / Bulletin board system / Computer network / Security hacker / DirectDraw Surface

The Rise and Fall of DDS evaluating the ambitions of AmsterdamÕs Digital City

Add to Reading List

Source URL: reinder.rustema.nl

Language: English - Date: 2011-04-20 17:16:48
115Mobile multifactor security  A revolution in authentication and digital signing Mobile multifactor security

Mobile multifactor security A revolution in authentication and digital signing Mobile multifactor security

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:48:03
116www.pwc.ch/digitaltrustge2016  Invitation Digital Trust Conference 2016

www.pwc.ch/digitaltrustge2016 Invitation Digital Trust Conference 2016

Add to Reading List

Source URL: old.pwc.ch

Language: English
117.ca Signing Metrics R. Gieben∗ NLnet Labs May 2, 2006  NLnet Labs document

.ca Signing Metrics R. Gieben∗ NLnet Labs May 2, 2006 NLnet Labs document

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:10
118Dear OGCIO,  I am very encouraged after reading the consultation paper on 2014 Digital 21 Strategy. The paper gives the impression Hong Kong will leverage its ICT achievements, huge pool of young, enthusiastic and innova

Dear OGCIO, I am very encouraged after reading the consultation paper on 2014 Digital 21 Strategy. The paper gives the impression Hong Kong will leverage its ICT achievements, huge pool of young, enthusiastic and innova

Add to Reading List

Source URL: www.digital21.gov.hk

Language: English - Date: 2014-01-20 06:40:06
119FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-05-26 13:27:36
120Solutions  Threat Intelligence Vanquish Digital Threats: Internal

Solutions Threat Intelligence Vanquish Digital Threats: Internal

Add to Reading List

Source URL: www.koverse.com

Language: English - Date: 2015-09-29 12:19:29