Encryption software

Results: 1087



#Item
31Cryptography / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Hash-based message authentication code / Critical Security Parameter / Key Wrap / SHA-2

Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-27 10:26:48
32Cryptography / Key management / Applied mathematics / Cryptographic software / Symmetric-key algorithm / Cipher / Key size / Block cipher / Key / Public-key cryptography / Encryption / Data Encryption Standard

A Survey for Solving Security Issues in Mobile Computing Sreenubabu Dasari Assistant Professor Department of CSE AITAM, Tekkali.

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2016-08-09 06:22:39
33Cryptography / Project 25 / Data Encryption Standard / Advanced Encryption Standard / Cryptographic software / Block ciphers / Disk encryption / NSA encryption systems / FASCINATOR

The Use of ADP Encryption in Federal Grant Funded Programs Author: John Oblak EF Johnson Technologies Vice President of Standards and Regulatory Affairs Chair TIA TR-8 Committee on Mobile and Personal Private Radio Stand

Add to Reading List

Source URL: www.efjohnson.com

Language: English - Date: 2011-08-21 12:33:27
34Software testing / International Software Testing Qualifications Board / Rex Black / K2 / Acceptance testing / Tiny Encryption Algorithm / Topography / Computing / Business

Microsoft Word - ISTQB_CTFL_Syll 2011.docx

Add to Reading List

Source URL: www.mstb.org

Language: English - Date: 2011-12-12 02:20:26
35Software / Keyhole Markup Language / Route planning software / Web mapping / Visualization / Google / Google Maps / Ggplot2 / Advanced Encryption Standard

Package ‘ggmap’ January 23, 2016 VersionTitle Spatial Visualization with ggplot2 Description A collection of functions to visualize spatial data and models on top of static maps from various online sources (e.

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2016-01-22 18:37:30
36Microcontrollers / Disk encryption / Instruction set architectures / Cryptographic software / Non-volatile memory / PIC microcontroller / USB flash drive / Serial Peripheral Interface Bus / In-system programming / Flash memory / Firmware / Encryption

Analysis of an encrypted HDD J. Czarny, R. Rigo May 11, 2015 Abstract The idea of this presentation is to debunk the myth that analyzing the security of hardware is difficult. From the perspective of a software reverse e

Add to Reading List

Source URL: www.sstic.org

Language: English - Date: 2015-05-26 11:04:26
37Hacking / Software testing / BitLocker / Disk encryption / Windows Server / Windows Vista / Code injection / Cross-site scripting / SQL injection / Buffer overflow / Transmission Control Protocol / Vulnerability

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
38Disk encryption / Cryptographic software / Cryptography / Cross-platform software / Password / Erlang / Crypt / BitLocker / GBDE

ENTERPRISE MANAGEMENT! WHAT E? Adding the ‘E’ to FOSS Cryptographic Data Storage Definitions

Add to Reading List

Source URL: rvasec.com

Language: English - Date: 2015-07-01 07:40:04
39Disk encryption / Cryptographic software / Password / USB flash drive / Crypt / BitLocker / Password manager

Encryption Procedure Removable Media Encryption – User Guide (Revision Date: Table of Contents

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2014-11-17 11:50:26
40Disk encryption / Cryptographic software / Online backup services / Cryptography / Windows Vista / USB flash drive / TrueCrypt / Dropbox / BitLocker / Bluetooth / Encryption / Computer security

VIDEO AS EVIDENCE: TECH TOOLS TECH TOOLS FOR TRANSFERRING FILES Filming for human rights can be dangerous. It can put you, the people you are filming

Add to Reading List

Source URL: librarywebfiles.s3.amazonaws.com

Language: English - Date: 2015-05-12 14:38:07
UPDATE