Secure Computing

Results: 5296



#Item
51Software / Computing / Internet privacy / Hypertext Transfer Protocol / World Wide Web / HTTP cookie / Session / HTTPS / Cookie / Google Chrome / Zombie cookie / Secure cookies

Cookie policy (Italian Data Protection Authority Regulations dated 8 May 2014 published in Italian Official Gazette no. 126 on 3 June 2014, implementing Directive EC)

Add to Reading List

Source URL: s3-eu-west-1.amazonaws.com

Language: English - Date: 2016-08-03 05:41:19
52Computer security / Cyberwarfare / Security / Cryptography / Antivirus software / Computer network security / Secure communication / Malware / Internet security / Vulnerability / Computer virus / Trusted computing base

The next step in IT security after Snowden Norbert Pohlmann Institute for Internet Security - if(is), Westphalian University of Applied Sciences Gelsenkirchen Neidenburger Str. 43, 45877 Gelsenkirchen, Germany

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-12-20 08:00:14
53Computing / Security engineering / Security / Smart devices / Vacation rental / Internet of Things / Smart lock / Renting / Key / Computer security / Smart TV / Draft:August Home

60 Percent of Guests Would Pay More for a Vacation Rental with a Smart Home Feature, August Home Study Reveals Smart Tech Helping Short-Term Rental Hosts Deliver Experience Superior to Hotels; Property More Secure with a

Add to Reading List

Source URL: august.com

Language: English - Date: 2016-08-03 16:40:46
54Computing / Security / Computer security / E-commerce / Secure communication / Tor / Ricochet / Software testing / Cryptography / Vulnerability / Transport Layer Security / Data validation

Ricochet Security Assessment Ricochet February 15, 2016 – Version 1.2 Prepared for John Brooks

Add to Reading List

Source URL: penetrationstest.se

Language: English - Date: 2016-04-11 13:49:12
55User interface techniques / Software / Point and click / Click consonant / Form / Computing / Humancomputer interaction

PALADIN REFERRAL FORM Paladin referrals should be sent by secure email or other secure method to . If you are sending from a secure email account (.pnn; .gsi; .gov;) please email info@paladinserv

Add to Reading List

Source URL: paladinservice.co.uk

Language: English - Date: 2014-07-31 03:24:21
56Enterprise application integration / Web services / Computing / Software engineering / Architectural pattern / Service-oriented architecture / Eduroam / Service-oriented / Software / Internet of things / Mobile app

A secure infrastructure for mobile blended learning applications M. Politze1, S. Schaffert2, B. Decker3 1 IT Center RWTH Aachen University, Seffenter Weg 23, 52074 Aachen,

Add to Reading List

Source URL: www.eunis.org

Language: English - Date: 2016-04-18 03:54:21
57Computing / Software testing / Software engineering / Software quality / Common Weakness Enumeration / Vulnerability / Coverity / Analysis / Fortify Software / Application security / LDRA Testbed / Static program analysis

Advanced Science and Technology Letters Vol.93 (Security, Reliability and Safety 2015), pp.5-8 http://dx.doi.orgastlA Software Weakness Analysis Technique for Secure Software

Add to Reading List

Source URL: onlinepresent.org

Language: English - Date: 2015-04-19 22:44:46
58Backup / Data security / Cloud storage / Computing / Backup software / Online backup services / Computer data storage

CLIENT SUCCESS STORY WHEN CRITERIA FOR SUCCESS FOUND THEIR SERVER SITTING IN A POOL OF WATER THEY KNEW THEY NEEDED A BETTER WAY TO SECURE THEIR DATA Sales improvement consultancy turns to KeepItSafe to improve their own

Add to Reading List

Source URL: www.keepitsafej2.co.uk

Language: English - Date: 2016-08-18 06:15:35
59Security / Cryptography / Computing / Formal sciences / Theoretical computer science / Secure multi-party computation / Cryptographic protocol / Mobile agent / Algorithm / Transmission Control Protocol / Computer security

Abstract Privacy, Integrity, and Incentive-Compatibility in Computations with Untrusted Parties Sheng Zhong 2004

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2004-07-28 23:00:33
60Computing / Wireless networking / Security / Computer network security / Information technology management / Secure communication / Data security / Wireless sensor network / Steganography / Computer security / Artificial immune system / Quality of service

CURRICULUM VITAE Prof. Sugata Sanyal School of Technology & Computer Science Tata Institute of Fundamental Research Homi Bhabha Road, Mumbai – 400005, India. Email:

Add to Reading List

Source URL: www.tifr.res.in

Language: English - Date: 2011-12-14 05:57:20
UPDATE