Hardware security

Results: 1760



#Item
41Network video recorder / Video hardware / NVR / Digital media / IP camera / Double-click / Digital video recorder / Imaging / Video

NVR Manual Welcome to use our network video recorder. For your secure using, please read this user manual carefully. The following contents are about the proper use of the product, the prevention of danger and loss of pr

Add to Reading List

Source URL: www.lowcost-security.ch

Language: English - Date: 2015-04-20 07:28:40
42Waste management / Computer recycling / Data security / Electronic waste / Natural environment / Recycling Lives / Recycling / Waste / Reuse / Industrial ecology / Appliance recycling / Waste Electrical and Electronic Equipment Directive

Computer recycling Secure data destruction and environmentally responsible computer hardware recycling Sustaining charity through metal and waste recycling

Add to Reading List

Source URL: www.recyclinglives.com

Language: English - Date: 2014-06-17 10:07:46
43Computer hardware / USB / Computing / Microcontrollers / Server hardware / ARM architecture / Single-board computers

Greenbone Security Manager Product Specifications GSM 600

Add to Reading List

Source URL: www.greenbone.de

Language: English - Date: 2016-08-19 11:06:48
44Software / System software / Computing / Linux Foundation / University of Cambridge Computer Laboratory / Xen / Hardware virtualization / Hypervisor / Paravirtualization / Hardware-assisted virtualization / Hyper-V / Virtualization

Advanced Exploitation: Xen Hypervisor VM Escape Shangcong Luan May 27, 2016 Alibaba Cloud Platform Security Team

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2016-05-27 10:02:21
45Computing / Software / System software / Hardware virtualization / X86 virtualization / Virtual machine / Hypervisor / Hardware-assisted virtualization / Virtualization / Multilevel security / VM / Protection ring

Layered Assurance Scheme for Multi-Core Architectures J. Alves-Foss, X. He and J. Song Center for Secure and Dependable Systems University of Idaho ,[xhhe,song3202]@vandals.uidaho.edu

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:30
46One Laptop per Child / Software / Computing / System software / Bitfrost / Laptop / Sugar / Security token / Personal firewall / OLPC XS / Hardware restriction

Bitfrost: the One Laptop per Child Security Model Ivan KrstiĀ“c Simson L. Garfinkel One Laptop per Child

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-08 09:53:29
47Server / Server hardware / Computing / INI file / Security software / Ambient intelligence

Spring 2015 Computing at INI Mira Angelova Director of Business Operations January 16, 2015

Add to Reading List

Source URL: www.ini.cmu.edu

Language: English - Date: 2015-01-22 17:09:32
48Computing / Computer errors / Computer memory / Server / Server hardware / Buffer overflow / Sendmail / Error detection and correction / Segmentation fault / Exception handling / Bounds checking / Transmission Control Protocol

Enhancing Server Availability and Security Through Failure-Oblivious Computing Martin Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy, Tudor Leu, and William S. Beebee, Jr. Computer Science and Artificial Intellig

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2016-03-08 07:04:45
49Ethernet / IEEE standards / Optics / Networking hardware / Beam splitter / Microscopy / Mirrors / Power over Ethernet / Computing / Network switch / Splitter / Electromagnetism

Security Solution Map V1.4 nonbleed

Add to Reading List

Source URL: www.optigo.net

Language: English - Date: 2015-10-05 17:32:34
50Computer hardware / Computing / Computer data storage / Lenovo / Server hardware / ThinkServer / Solid-state drive / NVM Express / PCI Express / ThinkStation / IdeaPad

Lenovo System x3650 M5 World-class performance and industry-leading reliability Lenovo Trusted Platform Assurance, a built-in set of security features and practices, protects the hardware and firmware. Also deploy self-e

Add to Reading List

Source URL: www.lenovo.com

Language: English - Date: 2016-04-01 11:16:15
UPDATE