Public security

Results: 63438



#Item
871Cryptography / Instant messaging clients / Cryptographic software / Communication software / Cross-platform software / WhatsApp / Signal / End-to-end encryption / Public-key cryptography / Key / Man-in-the-middle attack / Transport Layer Security

WhatsApp Encryption Overview Technical white paper April 4, 2016

Add to Reading List

Source URL: www.whatsapp.com

Language: English
872Deltek / Government / United States Department of Homeland Security

EXECUTIVE  SUMMARY   JUSTICE & PUBLIC SAFETY MARKET OVERVIEW FY 2015

Add to Reading List

Source URL: www.theindustrycouncil.org

Language: English - Date: 2015-04-06 12:31:40
873Cryptography / Computing / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / E-commerce / Keystore / Java Platform /  Enterprise Edition / Application server / Certificate authority / Java Secure Socket Extension

J2EE Security for Servlets, EJBs and Web services Pankaj Kumar Software Architect, HP Date: March 28, 2003

Add to Reading List

Source URL: pankaj-k.net

Language: English - Date: 2007-02-02 01:42:32
874Security / Prevention / Safety / Crime prevention / Cryptography / National security / Information governance / Public safety / Computer security / Security guard

Case Study: Global Security Services “We easily have saved at least 5 hours a week on just B*!!S#*! and paperwork. Like filing and looking up customers. We have really customized the fields that are customizable so ev

Add to Reading List

Source URL: www.hindsitesoftware.com

Language: English - Date: 2012-04-23 11:46:18
875

Guidelines for NMSU PolicyProtection of Non-Public Personal Information) Issued by NMSU ICT on; Non-Substantive editsNMSU’s Written Information Security Plan Background: A Federal Trade Com

Add to Reading List

Source URL: manual.nmsu.edu

Language: English - Date: 2015-10-21 21:15:52
    876Cryptography / Computer security / Security / ISO standards / Computer network security / Computer access control / Smart card / Ubiquitous computing / Authentication / Public-key cryptography / FIPS 140-2 / Security and safety features new to Windows Vista

    Microsoft Word - SC037 _2015__v3

    Add to Reading List

    Source URL: www.stc.tid.gov.hk

    Language: English - Date: 2015-10-01 12:03:19
    877Security / Safety / Prevention / National security / United States Department of Homeland Security / Cybercrime / Cyberwarfare / Computer network security / Computer security / Counter-terrorism / Homeland security / Texas Department of Public Safety

    TEXAS HOMELAND SECURITY STRATEGIC PLAN: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the Priority Actions aligned with each Objective in the Texas Homeland Security Strategic Plan 2015

    Add to Reading List

    Source URL: www.txdps.state.tx.us

    Language: English - Date: 2015-10-22 14:12:04
    878Computational complexity theory / Cryptography / Theory of computation / Circuit complexity / Cryptographic protocols / Complexity classes / Quantum complexity theory / Garbled circuit / Circuit / Secure multi-party computation / NC / Boolean circuit

    2015 IEEE Symposium on Security and Privacy Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs Eli Ben-Sasson§ , Alessandro Chiesa∗ , Matthew Green† , Eran Tromer¶ , Madars Virza‡ ∗ ETH

    Add to Reading List

    Source URL: diyhpl.us

    Language: English
    879Cryptography / Key management / Public key infrastructure / Public-key cryptography / Transport Layer Security / Extended Validation Certificate / Certification Practice Statement / Certificate policy / Public key certificate / Revocation list / Certificate authority / X.509

    Amazon Web Services Certification Practice Statement Version 1.0.2

    Add to Reading List

    Source URL: www.amazontrust.com

    Language: English - Date: 2015-11-04 23:31:46
    880Cryptography / Public-key cryptography / Videotelephony / MIKEY / Voice over IP / SakaiKasahara scheme / Gateway / VoIP gateway

    UNCLASSIFIEDCPA SECURITY CHARACTERISTIC MIKEY-SAKKE SECURE VOIP GATEWAY

    Add to Reading List

    Source URL: www.benthamsgaze.org

    Language: English - Date: 2016-01-19 12:23:15
    UPDATE