Secure Computing

Results: 5296



#Item
941Apple Inc. / Smartphones / Apple ID / Federated identity / IPhone / ITunes / Software / Computing / Application software

 Report on Government Information Requests July 1 - December 31, 2014 Apple takes our commitment to protecting your data very seriously and we work incredibly hard to deliver the most secure hardware, software and ser

Add to Reading List

Source URL: ssl.apple.com

Language: English - Date: 2015-04-09 21:05:48
942USB flash drive / Disk encryption / Computing / Removable media / Encryption / CD and DVD writing speed / Blu-ray Disc / Computer storage media / Electronics / Information science

Roxio Security for Law Firms Law firms can easily protect sensitive data stored on CD, DVD, Blu-ray Disc and USB flash media with Roxio Secure Burn Enterprise Law firms and their clients commonly store and exchange

Add to Reading List

Source URL: img.roxio.com

Language: English - Date: 2015-04-14 15:34:51
943Assertion / Computing / Science / Jared / Papua / Diamond

Why Jared Diamond is Wrong Jared Diamond, in his new book ‘The world until yesterday’, makes two erroneous assertions which, if they go unchallenged, will set back by several decades the movement to secure for the wo

Add to Reading List

Source URL: assets.survivalinternational.org

Language: English - Date: 2013-02-08 08:09:05
944Provisioning / Computing / Secure Shell / Domain Name System / Software / Web applications / Internet protocols / CPanel

WHMCS Installation Guide for CloudFlare certified partners Introduction The CloudFlare WHMCS Module allows hosting providers to offer CloudFlare through the use of Product Addons with any hosting plan sold. Hosting Provi

Add to Reading List

Source URL: www.cloudflare.com

Language: English - Date: 2015-05-20 17:51:40
945Cryptographic protocols / Secure communication / Password / FileVault / HTTP Secure / Security / Computing / Cryptography / Cryptographic software / Mac OS X

Technical Specifications CrashPlan PROe Security CrashPlan PROe is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops often

Add to Reading List

Source URL: essentials.code42.com

Language: English - Date: 2015-05-01 23:23:25
946Spamming / Computer-mediated communication / Spam filtering / Anti-spam techniques / Spam / Malware / Phishing / Email / Internet / Computing

Secure Email Gateway Protecting your organization’s email environment against spam and malware while managing complex compliance policies and preventing confidential data leakage can be a daunting challenge. Trustwave

Add to Reading List

Source URL: www.shireburn.com

Language: English - Date: 2013-04-05 05:06:26
947Internet / Password / HTTP cookie / Text messaging / Message transfer agent / Voice-mail / Gmail interface / Email / Computer-mediated communication / Computing

Secure e-mail - information to contacts The Swedish Courts regularly use e-mail as a compliment to traditional mail correspondence. In compliance with the Swedish Personal Data Act all electronic court communicati

Add to Reading List

Source URL: www.kammarrattenistockholm.domstol.se

Language: English - Date: 2014-12-09 05:27:59
948Computer security / Data breach / Data security / Secure communication / Hacker / Identity theft / Computing / Computer network security / Cyberwarfare

BLOG from Advent Resources DATA BREACHES AND THE NEW CAR DEALERSHIP Feb 17 Private data breaches are nothing new and could even be considered common place in today’s digitally connected world. We’ve all heard about

Add to Reading List

Source URL: automotivedigest.com

Language: English - Date: 2015-02-24 14:09:20
949Data management / Data privacy / Database management systems / European Data Protection Supervisor / Information privacy / Open data / Internet privacy / Data Protection Directive / Internet / Technology / Computing / Privacy

Big data, big data protection: challenges and innovative solutions ERA Conference on Recent Developments in Data Protection Law Keynote speech Brussels, 11 MayGiovanni Buttarelli

Add to Reading List

Source URL: secure.edps.europa.eu

Language: English - Date: 2015-05-11 07:14:48
950Law / Identity management / Internet privacy / Information privacy / FTC Fair Information Practice / Ethics / Privacy / Computing

PRIVACY POLICY PROCTOREXAM At ProctorExam, we care about the confidentiality and security of your personal information. We will use commercially reasonable efforts to keep your Personal Information secure in compliance w

Add to Reading List

Source URL: proctorexam.com

Language: English
UPDATE