Secure Computing

Results: 5296



#Item
981Computer programming / Parallel computing / Fortran / OpenMP / Secure Shell / Thread / MIC / X Window System / Computing / Software / Application programming interfaces

Lab # MIC Offload Experiments offload_lab.tar

Add to Reading List

Source URL: portal.tacc.utexas.edu

Language: English - Date: 2013-11-15 14:35:16
982Windows Explorer / Special folder / IBM Lotus Notes / Microsoft PowerPoint / Microsoft Excel / Folder / IBM Lotus Quickr / Microsoft Office / SkyDrive / Software / Computing / Presentation software

PDF Document

Add to Reading List

Source URL: intranet.secure.griffith.edu.au

Language: English
983Internet protocols / Internet standards / FTP / File Transfer Protocol / Secure Shell / Comparison of FTP client software / Server / Port / Remote administration / Computing / Internet / Network architecture

VersionWhite paper ReleaseArbit technical reference: Rasmus Borch

Add to Reading List

Source URL: www.arbitsecurity.com

Language: English - Date: 2012-02-24 03:38:10
984Computing / Accellion /  Inc. / Gemalto / Computer network security / Security / Computer security

INSIDE Secure_Infosecurity Products Guide_FINAL

Add to Reading List

Source URL: www.insidesecure.com

Language: English
985Fortran / OpenMP / Secure Shell / File Transfer Protocol / Cd / Alias / Thread / Computing / Application programming interfaces / Parallel computing

Lab1_User_Env_Stampede.pptx

Add to Reading List

Source URL: portal.tacc.utexas.edu

Language: English - Date: 2013-11-15 14:35:12
986Roboform / Cloud computing / Ovi / Software / Backup software / GoodSync / Computing

SIBER SYSTEMS RELEASES GOODSYNC 9 FEATURING GOODSYNC CONNECT File Synchronization Software Moves beyond Cloud for Fast, Affordable, Secure Alternative Fairfax, VA - (February 21st, Siber Systems, Inc., a leading

Add to Reading List

Source URL: www.goodsync.com

Language: English
987Ioctl / Unix / Linux kernel / Linus Torvalds / Software / Free software / Computing

Userspace ABI and GFX KMD upstreaming requirements Daniel Vetter 1

Add to Reading List

Source URL: secure.freedesktop.org

Language: English - Date: 2015-05-08 09:20:46
988Computer security / Computing / Computer network security / Crime prevention / National security / OpenSSL / Password / Transport Layer Security / Vulnerability / Security / Electronic commerce / Secure communication

PDF Document

Add to Reading List

Source URL: www.elliottdavis.com

Language: English - Date: 2014-04-30 16:48:21
989Computer cluster / Concurrent computing / MPICH / John the Ripper / Secure Shell / Localhost / Computing / Software / Parallel computing

http://www.petur.euJune 2010 John the Ripper on a UbuntuMPI Cluster

Add to Reading List

Source URL: download.openwall.net

Language: English - Date: 2010-06-17 14:13:59
990Unix shells / Cross-platform software / Computer network security / Hacking / Zero-day attack / Vulnerability / Bash / Secure Shell / Exploit / Software / Computing / Scripting languages

PROTECTING AGAINST THE SHELLSHOCK BASH VULNERABILITY, WITH SENTRIX Technical Brief What is Bash? Bash is a command-line shell similar to the Windows cmd.exe. It is one of the most

Add to Reading List

Source URL: www.sentrix.com

Language: English - Date: 2014-10-03 03:49:12
UPDATE