Hardware security

Results: 1760



#Item
991System software / Centrino / Intel vPro / Intel / Ultrabook / X86 virtualization / AES instruction set / Dell Vostro / Flexible Display Interface / Computer hardware / X86 architecture / Computing

3rd to 5th Generation Intel® Core™ vPro™ Processor Family 5th generation Intel® Core™ vPro™ processor-based devices are designed to meet the mobility needs of your users and the security requirements of your en

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2015-02-05 11:15:41
992Electronics / Technology / Digital subscriber line / Internet / Telecommunications / Residential gateway / International Computer Security Association / Computing / Pitney Bowes / Networking hardware / Modems / Logical Link Control

ICSA Labs Custom Testing Evaluation Testing Report Pitney Bowes, Inc. Connect+ Family DSL Compatibility Test June 20, 2011

Add to Reading List

Source URL: www.icsalabs.com

Language: English - Date: 2011-10-13 10:15:35
993Networking hardware / Ethernet / Electric power / Power over Ethernet / IP reader / Uninterruptible power supply / Security / IEEE standards / Access control

Solutions Checklist ISONAS Access Control Solutions ISONAS IP solutions are designed to put real-time control of security in your hands. With our true network devices you have no need for control panels. The readercontr

Add to Reading List

Source URL: kondorsecurity.com

Language: English - Date: 2009-03-22 19:05:16
994Local area networks / Computer architecture / Networking hardware / Virtual LAN / Access control list / Switch virtual interface / IP address / Generic Routing Encapsulation / Router / Computing / Network architecture / Computer network security

CH A P T E R 26 Configuring Network Security with ACLs This chapter describes how to configure network security on the Cisco ME 3800X and 3600X switch by

Add to Reading List

Source URL: www.cisco.com

Language: English
995Computer buses / Computing / Business / Computer hardware / Electronic commerce / Payment Card Industry Data Security Standard / Conventional PCI / EMV / ISO / Payment systems / Data privacy / Credit cards

Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Security Requirements

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2013-06-07 05:33:07
996Technology / ISO standards / Ubiquitous computing / Security token / Smart card / Card reader / Bluetooth / Universal Serial Bus / Tablet computer / Computing / Computer hardware / Smart cards

m-Identity Basic Security Air+ Enterprise Edition Smart card security for the mobile world

Add to Reading List

Source URL: www.kobil.com

Language: English - Date: 2014-08-14 04:13:17
997Computing / Business software / Actuarial science / Oracle Corporation / IT risk management / Corporate governance of information technology / SAP AG / Governance /  risk management /  and compliance / Risk management / Business / Security / Information technology management

Hardware and Software Engineered to Work Together Harness Enterprise Risks With Oracle Governance,

Add to Reading List

Source URL: www.oracle.com

Language: English
998Computer storage / Data security / Standards organizations / Theft / USB flash drive / Computer data storage / Backup / Institute of Electrical and Electronics Engineers / Data storage device / Computer hardware / Information science / Information

STANDARDS Security in Storage: A Call for Participation Jack Cole, US Army Research Laboratory

Add to Reading List

Source URL: msstc.org

Language: English - Date: 2010-03-02 12:00:02
999Technology / ISO standards / Ubiquitous computing / Security token / Smart card / Card reader / Bluetooth / Universal Serial Bus / Tablet computer / Computing / Computer hardware / Smart cards

m-Identity Basic Security Air+ Enterprise Edition Smart card security for the mobile world

Add to Reading List

Source URL: www.kobil.com

Language: English - Date: 2014-10-07 05:08:03
1000Computer hardware / User interface techniques / Virtual reality / Artificial intelligence / Kinect / Webcams / Gesture recognition / Gesture / Internet privacy / Human–computer interaction / User interfaces / Computing

Prepose: Security and Privacy for Gesture-Based Programming MSR-TR[removed]Lucas Silva Figueiredo

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2014-11-14 21:50:27
UPDATE