Secure communication

Results: 3134



#Item
141Hypertext Transfer Protocol / Secure communication / Cryptographic protocols / Internet privacy / Cryptographic software / Stunnel / Load balancing / HTTPS / HTTP cookie

ALOHA LOAD BALANCER MANAGING SSL ON THE BACKEND “APPNOTE” #0022 ― MANAGING SSL ON THE BACKEND This application note is intended to help you implement SSL management on the backend (to encrypt data before connecting

Add to Reading List

Source URL: www.haproxy.com

Language: English - Date: 2014-04-28 06:44:16
142Humancomputer interaction / Usability / Human communication / Computer security / Ergonomics / User interface / Principle of least privilege / User / Error message / User interface design / Secure by default

Secure Interaction Design and the Principle of Least Authority Ka-Ping Yee Group for User Interface Research University of California, Berkeley

Add to Reading List

Source URL: www.andrewpatrick.ca

Language: English - Date: 2003-01-18 03:43:58
143Cybercrime / National security / Computer security / Secure communication / Cyberwarfare / Sony Pictures Entertainment hack / Security hacker / Cyber-attack

Microsoft Word - Sample blog post from PowerLine.docx

Add to Reading List

Source URL: bestwritetech.com

Language: English - Date: 2016-05-03 15:10:28
144Cybercrime / Social engineering / Computer security / National security / Secure communication / Sony Pictures Entertainment hack / Phishing / IID / Cyberwarfare / Malware / Heartbleed / Data breach

eCrime Trends Report Fourth Quarter 2014

Add to Reading List

Source URL: internetidentity.com

Language: English - Date: 2015-02-25 14:12:04
145Computer network security / Cyberwarfare / Computer security / Cybercrime / Secure communication / Password / Intrusion detection system / Malware

Microsoft PowerPoint - 3_Cybersecurity_myths.pptx

Add to Reading List

Source URL: www.dote.osd.mil

Language: English - Date: 2015-06-12 17:08:23
146Dark web / Secure communication / Internet privacy / File sharing / Cross-platform software / Tor / Onion routing / Anonymous remailer / I2P / Proxy server / Peer-to-peer / Crowds

How Much Anonymity does Network Latency Leak? Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Tin University of Minnesota 200 Union St SE Minneapolis, MNUSA

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:40
147Cryptography / Computer network security / Computer security / Cyberwarfare / National security / Secure communication / Application security / Communications security / Wireless security / Software-defined radio / Advanced Learning and Research Institute / Software security assurance

NRL BAA Announcement # HIGH ASSURANCE ENGINEERING AND COMPUTING The Center for High Assurance Computer Systems of the Naval Research Laboratory (NRL) is seeking white papers for innovative research, advanced sys

Add to Reading List

Source URL: heron.nrl.navy.mil

Language: English - Date: 2016-02-17 10:17:54
148Software testing / Common Data Link / Secure communication / Test automation

highresRT_Logic-Kratos_Logo

Add to Reading List

Source URL: www.rtlogic.com

Language: English - Date: 2016-08-09 00:37:55
149Mining / Occupational safety and health / Alaska / International Mayor Communication Centre / Mine reclamation

“The Interstate Mining Compact Commission: Seeking to Secure State Sovereignty in the Minerals Arena” Interstate Mining Compact

Add to Reading List

Source URL: www.imcc.isa.us

Language: English - Date: 2014-01-27 12:58:25
150Law enforcement in Europe / Schengen Routing / Schengen Area / Routing / Border Gateway Protocol / Schengen

Schengen routing or Schengen encryption? Secure communication and digital sovereignty in Europe Prof. Norbert Pohlmann

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-11-23 13:40:12
UPDATE