Digital security

Results: 4317



#Item
861Graphics file formats / Adobe Systems / Adobe InDesign / Portable Document Format / Acrobat.com / Electronic publishing / Amazon.com / Amazon Web Services / Adobe Creative Suite / Software / Computing / Desktop publishing software

Adobe Digital Publishing Suite, Enterprise Edition Security Overview White Paper Adobe Digital Publishing Suite, Enterprise Edition Security Overview Adobe Security At Adobe, we take the security of your digital experie

Add to Reading List

Source URL: www.adobe.com

Language: English - Date: 2015-04-28 04:18:00
862Mobile technology / Mobile device management / Bring your own device / Computer security / Organisation of Islamic Cooperation / Information security / Freedom of information legislation / Right to Information Act / Password / Mobile computers / Technology / Security

POLICY – OFFICE OF THE INFORMATION COMMISSIONER Use of portable storage devices 1. Purpose A Portable Storage Device (PSD) is a mobile device capable of storing and transferring digital information. Examples include p

Add to Reading List

Source URL: www.oic.qld.gov.au

Language: English - Date: 2013-07-17 00:34:06
863Water / Water transport / International relations / International Convention for the Safety of Life at Sea / STCW / International Maritime Dangerous Goods Code / International Ship and Port Facility Security Code / MARPOL 73/78 / International Register of Shipping / Law of the sea / International Maritime Organization / Transport

Digital Maritime Regulations International DMR Product Specification Digital Maritime Regulations is available as an international product. International DMR includes: International Convention for the Safety of Life at S

Add to Reading List

Source URL: www.regs4ships.com

Language: English - Date: 2015-03-11 05:37:13
864Data security / Technology / Digital media / Internet / New media / Scientific revolution / Computer security / Backup / Information security / Security / Crime prevention / National security

INFORMATION TECHNOLOGY (IT) POLICY RATIONALE North Melbourne Language and Learning (NMLL) provides computer classes and community access to computers on a nominal fee basis. Access to Information Technology (IT) can prov

Add to Reading List

Source URL: www.nmll.org.au

Language: English - Date: 2013-08-13 17:26:56
865Cyberwarfare / Crime prevention / National security / FireEye /  Inc. / Information security / Attack / Threat / Computer network security / Security / Computer security

Leading Global Digital Communications Specialist Implements FireEye as a Service to Protect Clients from Advanced Attackers C U S T O M E R

Add to Reading List

Source URL: www.fireeye.kr

Language: English - Date: 2015-04-30 15:17:11
866National security / Security / Robert Bosch GmbH / Closed-circuit television / ONVIF / Secure Digital / IP camera / Surveillance / Technology / Video

Video | FLEXIDOME micro 2000 IP FLEXIDOME micro 2000 IP www.boschsecurity.com The Bosch 720p and VGA indoor microdome cameras

Add to Reading List

Source URL: us.sourcesecurity.com

Language: English - Date: 2013-12-04 04:21:20
867Digital signature / RSA / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / ID-based encryption

Key Replacement Attack on a Certificateless Signature Scheme Zhenfeng Zhang, Dengguo Feng, State Key Laboratory of Information Security Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China zfzhan

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-30 05:02:16
868DIN connector / Electrical connector / Digital cameras / Technology / Photography / Electronics / Telescopes / Zoom lens / Camera lens

Applicable camera (model) For Security

Add to Reading List

Source URL: us.sourcesecurity.com

Language: English - Date: 2010-01-08 04:00:43
869Cyberwarfare / Crime prevention / National security / FireEye /  Inc. / Information security / Attack / Threat / Computer network security / Security / Computer security

Leading Global Digital Communications Specialist Implements FireEye as a Service to Protect Clients from Advanced Attackers C U S T O M E R

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-04-30 15:17:11
870Internet broadcasting / Internet protocols / Digital television / Internet television / Computer network security / Transmission Control Protocol / Communications protocol / IPTV / Firewall / Computing / Internet / Data

HLS Booster -- Compact IP Gateways for Reliable Delivery of HLS Video Traffic Over Public Internet

Add to Reading List

Source URL: dveo.com

Language: English - Date: 2015-01-31 03:09:31
UPDATE