Transport Layer Security

Results: 1523



#Item
931Internet privacy / Cryptographic protocols / Internet protocols / Secure communication / Internet standards / Opportunistic encryption / Science and Technology Options Assessment / Transport Layer Security / Virtual private network / Internet / Computing / Cryptography

Science and Technology Options Assessment (STOA) Mass Surveillance Part 2 – Technology foresight, options for longer term security

Add to Reading List

Source URL: www.europarl.europa.eu

Language: English - Date: 2015-01-09 09:28:01
932Internet privacy / Electronics / Internet access / Broadband / Internet ethics / Virtual private network / Network neutrality / Netflix / Transport Layer Security / Computing / Internet / Computer network security

Before the Federal Communications Commission Washington, D.C[removed]In the Matter of Protecting and Promoting the Open Internet

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2014-10-13 13:03:25
933Data security / Prevention / Crime prevention / National security / Information security / Transport Layer Security / Risk management / Risk / Security controls / Security / Public safety / Computer security

IT security incidents and the role of the DPO Achim Klabunde DPO Meeting@CEDEFOP[removed]

Add to Reading List

Source URL: secure.edps.europa.eu

Language: English - Date: 2014-11-14 06:44:13
934Internet standards / Data / Internet / OAuth / Simple Authentication and Security Layer / Datagram Transport Layer Security / Transport Layer Security / Extensible Authentication Protocol / Generic Security Services Application Program Interface / Internet protocols / Cryptographic protocols / Computing

Independent Submission Request for Comments: 7397 Category: Informational ISSN: [removed]J. Gilger

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2014-12-12 19:53:40
935Error detection and correction / Internet protocols / Secure communication / Hashing / Cryptographic protocols / HMAC / Transport Layer Security / SHA-2 / Cryptographic hash function / Cryptography / Cryptographic software / Computing

Microsoft Word - 1l - Accellion Security Policy_Acc_IGL_2014[removed]Accellion response.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-24 11:16:41
936Cryptographic protocols / Internet standards / Internet protocols / Tunneling protocols / Data / Transport Layer Security / Virtual private network / Cisco Systems VPN Client / Requirement / Computer network security / Computing / Internet

CPA Security Characteristic - TLS VPN for Remote Working - Software Client Version 1.0

Add to Reading List

Source URL: www.cesg.gov.uk

Language: English - Date: 2013-07-18 00:20:27
937Internet standards / Computer network security / Denial-of-service attacks / Tcpdump / Pcap / Transport Layer Security / Router / Transmission Control Protocol / Denial-of-service attack / Software / Computing / Network architecture

Another Perspective to IP-Darkspace Analysis RESTENA - CSIRT Computer Security Incident Response Team Cynthia Wagner, Marc Stiefer,

Add to Reading List

Source URL: circl.lu

Language: English - Date: 2014-03-28 07:10:33
938Public-key cryptography / Secure communication / Key management / Transport Layer Security / HTTP Secure / Cipher suite / Public key certificate / Certificate authority / Server Name Indication / Cryptography / Cryptographic protocols / Internet protocols

BULLETPROOF SSL AND TLS Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications Free edition: Getting Started

Add to Reading List

Source URL: www.feistyduck.com

Language: English - Date: 2015-01-14 13:09:04
939Network architecture / Internet protocols / Cryptographic protocols / OFTP / Electronic commerce / European Network Exchange / Transport Layer Security / Public-key cryptography / Encryption / Internet standards / Internet / Computing

SEEBURGER_OFTP2_engl.indd

Add to Reading List

Source URL: www.seeburger.com

Language: English - Date: 2012-05-22 09:08:25
940Internet / Network architecture / Electronic commerce / Internet protocols / Cryptographic protocols / Transport Layer Security / Load balancing / Application firewall / Hardware security module / Computing / Internet standards / Secure communication

Keyless SSL Retain on-premise custody of SSL private keys with cloud-based DDoS mitigation, CDN, WAF and more Keyless SSL lets sites use CloudFlare for SSL traffic while retaining on-premise

Add to Reading List

Source URL: www.cloudflare.com

Language: English - Date: 2014-09-17 20:09:21
UPDATE