Digital security

Results: 4317



#Item
921Crime prevention / Surveillance / Law enforcement / Closed-circuit television / Security / National security / Public safety

Microsoft Word - Cabaret_Digital_Video_Surveillance_Certification.doc

Add to Reading List

Source URL: www.nyc.gov

Language: English - Date: 2010-07-29 15:53:44
922Computer file formats / Graphics file formats / Copyright law / Digital rights management / Open formats / Portable Document Format / Adobe Acrobat / JavaScript / Adobe Flash Player / Software / Computing / Digital press

Why LockLizard as your DRM supplier The key features we offer you are: security, capability, functionality, and pricing. Key protection functionality • •

Add to Reading List

Source URL: www.locklizard.com

Language: English - Date: 2014-12-15 14:27:32
923Computer security / MD5 / Cryptographic hash functions / Search algorithms / Archive formats / Crypt / GNU Privacy Guard / Zip / MD4 / Cryptography / Computing / Hashing

Practical Attacks on Digital Signatures Using MD5 Message Digest Ondrej Mikle Department of Software Engineering at Faculty of Mathematics and Physics, Charles University, Prague, Czech Republic

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2004-12-02 07:12:00
924Print production / ADAC / Road safety / Digital press / K4 / Prepress / Adobe InCopy / Adobe InDesign / Portable Document Format / Printing / Software / Computing

user story ADAC Motorwelt Tags: Automation, Dalim Dialogue, e-paper, IT security, members’ magazine, process optimization, interfaces, soft-proofing, Web publishing, XML export

Add to Reading List

Source URL: www.vjoon.de

Language: English - Date: 2013-08-16 05:57:04
925Competitions / Digital media / Grants / Research / Electronic submission / Peer review / The Isis Magazine / Institute for Science and International Security / Iranian studies / Science / Knowledge / Academia

ELEVENTH BIENNIAL IRANIAN STUDIES CONFERENCE University of Vienna Tuesday-Friday, 2-5 August 2016 CONFERENCE INFORMATION The International Society for Iranian Studies (ISIS) is pleased to announce that the Eleventh Bienn

Add to Reading List

Source URL: www.iranicaonline.org

Language: English - Date: 2015-02-19 16:24:20
926Cryptographic protocols / Strong cryptography / Key / Password / Cryptographic hash function / Digital signature / Cryptanalysis / Cryptosystem / Key generation / Cryptography / Key management / Public-key cryptography

Cryptographic Design Vulnerabilities Strong cryptography is very powerful when it is done right, but it is not a panacea. Focusing on cryptographic algorithms while ignoring other aspects of security is like defending yo

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
927Security / Intrusion detection system / Anomaly detection / Vulnerability / Attack / Rootkit / Threat / Multics / Snort / Computer security / Computer network security / Cyberwarfare

IJIS: 14–35 / Digital Object Identifier (DOIs102070100001 Intrusion and intrusion detection John McHugh CERT Coordination Center∗ , Software Engineering Institute, Carnegie Mellon University,

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2014-02-03 21:40:14
928Digital rights management / Tape library / Business / Law / Public safety / Backup / Data security / Off-site data protection

® developed by CODE RELIEF, LLC STORAGE TECHNICIAN BRIEFING

Add to Reading List

Source URL: www.coderelief.com

Language: English - Date: 2013-05-14 11:43:25
929Data security / Psychological resilience / Data / Digital preservation / Data loss / Museology / Information / Backup

This article is part of the Reliability Society 2010 Annual Technical Report Toward Resilient Healthcare Information System Goutam Kumar Saha Email: , Healthcare information or Medical in

Add to Reading List

Source URL: rs.ieee.org

Language: English - Date: 2011-06-09 12:49:44
930Electronics / Acceptable use policy / Computer security / Email / Etiquette / Internet culture / Mayo College / Intranet / County Mayo / Computing / Digital media / Internet privacy

Mayo College, Ajmer Student Acceptable Intranet/Internet Usage Policy Principal, Mayo College is pleased to provide Internet/Intranet resource access to students as a privilege and not a right. Mayo College’s goal in p

Add to Reading List

Source URL: www.mayocollege.com

Language: English - Date: 2012-01-12 06:37:17
UPDATE