Disk encryption software

Results: 525



#Item
471Security and Snake Oil: Choosing the right encryption software One of the best solutions to the need to protect sensitive information is through data encryption.

Security and Snake Oil: Choosing the right encryption software One of the best solutions to the need to protect sensitive information is through data encryption.

Add to Reading List

Source URL: www.winencrypt.com

Language: English - Date: 2009-01-08 06:10:11
472Bitlocker and Windows Vista  This is an INCOMPLETE draft version. Visit www.nvlabs.in for updates.  Nitin Kumar

Bitlocker and Windows Vista This is an INCOMPLETE draft version. Visit www.nvlabs.in for updates. Nitin Kumar

Add to Reading List

Source URL: www.nvlabs.in

Language: English - Date: 2013-11-13 03:35:04
473Analysis of Window Vista Bitlocker Drive Encryption This is an INCOMPLETE draft version. Visit www.nvlabs.in for updates

Analysis of Window Vista Bitlocker Drive Encryption This is an INCOMPLETE draft version. Visit www.nvlabs.in for updates

Add to Reading List

Source URL: www.nvlabs.in

Language: English - Date: 2013-11-13 03:34:25
474Bitlocker: A little about the internals and what changed in Windows 8 Dan Rosendorf S.ICZ Na hˇrebenech II[removed]Praha 4

Bitlocker: A little about the internals and what changed in Windows 8 Dan Rosendorf S.ICZ Na hˇrebenech II[removed]Praha 4

Add to Reading List

Source URL: spi.unob.cz

Language: English - Date: 2013-05-23 04:28:04
475TRUECRYPT FREE OPEN-SOURCE ON-THE-FLY ENCRYPTION USER’S GUIDE Version Information TrueCrypt User’s Guide, version 3.1a. Released February 7, 2005.

TRUECRYPT FREE OPEN-SOURCE ON-THE-FLY ENCRYPTION USER’S GUIDE Version Information TrueCrypt User’s Guide, version 3.1a. Released February 7, 2005.

Add to Reading List

Source URL: docs.huihoo.com

Language: English - Date: 2008-12-05 04:23:51
476Disk encryption / Special purpose file systems / Encrypting File System / Pretty Good Privacy / Cipher / Encryption software / Email encryption / Symmetric-key algorithm / Filesystem-level encryption / Cryptography / Cryptographic software / Public-key cryptography

DOC Document

Add to Reading List

Source URL: www.netaction.org

Language: English - Date: 2007-08-27 11:25:52
477Microsoft Word - GoldKey PIV Manual-7.12.docx

Microsoft Word - GoldKey PIV Manual-7.12.docx

Add to Reading List

Source URL: www.goldkey.com

Language: English - Date: 2014-06-16 11:28:10
478Porticor Virtual Private Data Safeguarding Data in the Cloud Porticor® Virtual Private Data™ (VPD™) combines state of the art data encryption with patented homomorphic split-key management to offer the most secure,

Porticor Virtual Private Data Safeguarding Data in the Cloud Porticor® Virtual Private Data™ (VPD™) combines state of the art data encryption with patented homomorphic split-key management to offer the most secure,

Add to Reading List

Source URL: www.porticor.com

Language: English - Date: 2013-07-04 08:48:08
479IT Security Practices While Departmental and Campus IT units are accountable for the security of computer networks; computer and data security is also each individual’s responsibility. In addition, researchers are ofte

IT Security Practices While Departmental and Campus IT units are accountable for the security of computer networks; computer and data security is also each individual’s responsibility. In addition, researchers are ofte

Add to Reading List

Source URL: tigger.uic.edu

Language: English - Date: 2010-05-24 17:28:35
480Modeling TCG-based Secure Systems with Colored Petri Nets? Liang Gu† , Yao Guo†?? , Yanjiang Yang § , Feng Bao§ , Hong Mei† †  Key Laboratory of High Confidence Software Technologies (Ministry of Education),

Modeling TCG-based Secure Systems with Colored Petri Nets? Liang Gu† , Yao Guo†?? , Yanjiang Yang § , Feng Bao§ , Hong Mei† † Key Laboratory of High Confidence Software Technologies (Ministry of Education),

Add to Reading List

Source URL: sei.pku.edu.cn

Language: English - Date: 2010-11-12 00:51:14