Hardware security

Results: 1760



#Item
81Cloud infrastructure / Cloud computing / Cloud computing security / Computer security / Hypervisor / VM / Cloud computing issues / HP CloudSystem

hardware security module (HSM) geotag platform trust policy hardened virtual server image Trusted Platform BIOS

Add to Reading List

Source URL: cloudschool.com

Language: English - Date: 2016-06-06 17:05:59
82Public-key cryptography / Cryptographic software / Cryptographic hash functions / Key management / Cryptography standards / Hardware security module / Microsoft CryptoAPI / RSA / PKCS / SHA-1 / Hash-based message authentication code / Digital signature

LYNKS Series II Authentication HSM TM High-Assurance Hardware Security Module Specifically Designed for Authentication Applications

Add to Reading List

Source URL: www.spyrus.com

Language: English - Date: 2015-08-05 12:42:41
83Networking hardware / Computer network security / Dynamic Host Configuration Protocol / Network service / IP address / DSL modem / Firewall / Internet Connection Sharing

McAfee UTM Firewall Quick Installation Guide

Add to Reading List

Source URL: go.mcafee.com

Language: English - Date: 2009-05-29 08:51:04
84Public key infrastructure / Public-key cryptography / Key management / Transport Layer Security / Cryptographic protocols / Certificate policy / X.509 / Online Certificate Status Protocol / Public key certificate / Revocation list / Certificate authority / Hardware security module

SAUDI NATIONAL PKI POLICY Document Classification: Public Version Number: 1.5

Add to Reading List

Source URL: www.ncdc.gov.sa

Language: English - Date: 2013-08-19 04:01:16
85Doors / Door furniture / Passive fire protection / Fire door / Ironmongery / Door / Fire protection / Lockset / International Building Code / Latch / Occupancy / Building code

Classroom Door Security & Locking Hardware The ability to protect students and teachers while in the classroom is a high priority in all educational institutions. Many schools and school districts have taken measures to

Add to Reading List

Source URL: www.firemarshals.org

Language: English - Date: 2016-02-03 10:22:22
86Computer network security / Deep packet inspection / Net neutrality / Networking hardware / Internet in China / Middlebox / Dots per inch / Network intelligence / Packet processing / DPI / Software-defined networking

Deep Packet Inspection as a Service Anat Bremler-Barr Yotam Harchol School of Computer Science

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:57:13
87Antivirus software / Anti-spam techniques / Avira / Email spam / Spamming / Symantec / Service-level agreement / MessageLabs / Computer virus / Norton Internet Security / Bitdefender

Datasheet: Symantec.cloud Service Level Agreements Industry Leading Service Level Agreements Cloud services enable organizations to lower total cost of ownership and simplify administration by replacing on-site hardware

Add to Reading List

Source URL: www.excelmicro.com

Language: English - Date: 2013-02-14 11:53:21
88Instruction set architectures / Central processing unit / Computer architecture / Memory management / Memory protection / Capability-based security / Pointer / MIPS instruction set / 64-bit computing / Instruction set / Reduced instruction set computing / Kernel

Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-12-01 06:21:41
89Disk encryption / Encryption / Block cipher mode of operation / Advanced Encryption Standard / Storage security / Cryptography / Data Encryption Standard / Hardware-based full disk encryption / Disk encryption hardware

NEWS Enova Technology Corporation 1st Floor, #11, Research & Development 2nd Road Science-based Industrial Park, Hsin-Chu City Taiwan 30076, Republic of China Phone:

Add to Reading List

Source URL: www.enovatech.net

Language: English - Date: 2013-01-11 00:43:12
90Cryptography / Cryptographic software / ISO standards / Hardware security module / Smart card / BitLocker / USB / Key / Secure Hash Algorithm / NSA Suite B Cryptography / Elliptic curve cryptography / Rosetta

PocketVault™ Smart USB 3.0 Dual Storage and Integrated Rosetta® PKI Smart Card Capability Protect the Key In Your Pocket PocketVault Smart USB 3.0 combines SSD storage with a Rosetta Hardware Security Module (HSM) to

Add to Reading List

Source URL: www.spyrus.com

Language: English - Date: 2015-08-05 12:26:38
UPDATE