Trusted computing

Results: 881



#Item
121Trusted computing / Hardware security module / Secure cryptoprocessor / Automated teller machine / EMV / Next-Generation Secure Computing Base / Smart card / Trusted Platform Module / Security of automated teller machines / Cryptography / Computer security / Espionage

CHAPTER 18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — Goldfinger

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 09:57:39
122National security / National Security Agency / Mandatory access control / Multilevel security / Access Control Matrix / Information security / Trusted Computer System Evaluation Criteria / Access control / Trusted computing base / Computer security / Security / Crime prevention

Microsoft Word - 1995_CRC_Handbook_Article MSWord.doc

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:38
123Cloud infrastructure / IBM cloud computing / Kaavo / Cloud computing / Centralized computing / Computing

G-Cloud Hybrid Cloud Solutions Deploying physical assets in a secure cloud The trusted way to deploy your IT In a complex IT environment, complete virtualisation is not always possible. In a typical secure Cloud Infrastr

Add to Reading List

Source URL: www.scc.com

Language: English - Date: 2015-04-24 05:47:18
124Smartphones / Multi-touch / IOS / ITunes / Mobile device management / IPhone / IPad / Cloud computing / SyncShield / Computing / Software / Apple Inc.

G-Cloud Mobile Device Management (MDM) for Apple iOS The trusted way to deploy Apple iOS Our G-Cloud MDM Service for Apple iOS will transform the management of your Apple estate. The CESG-compliant service allows your em

Add to Reading List

Source URL: www.scc.com

Language: English - Date: 2015-04-24 05:52:44
125

Sealed Cloud Technisch sicheres Cloud Computing Die eigenen Datenbestände sind für Unternehmen wie ein gut gehüteter Schatz, egal ob es sich um Geschäftsgeheimnisse oder andere interne Dokumente handelt. Diese Daten

Add to Reading List

Source URL: www.trusted-cloud.de

Language: German - Date: 2014-07-30 04:06:41
    126Crime prevention / National security / Common Criteria / Trusted Computer System Evaluation Criteria / Information security / Trusted computing base / Operating system / National Security Agency / Multilevel security / Computer security / Security / Evaluation

    Chapter #N IMPROVING INFORMATION FLOW IN THE INFORMATION SECURITY MARKET DoD Experience and Future Directions Carl E. Landwehr University of Maryland

    Add to Reading List

    Source URL: www.landwehr.org

    Language: English - Date: 2014-08-18 19:01:35
    127Network architecture / Cloud computing / Virtual private network / Two-factor authentication / Web portal / Computer architecture / Computer security / Computer network security / Computing / Internet privacy

    G-Cloud Remote Access Service Access to Secure Cloud over the Internet The trusted way to enable your mobile workforce Seamless user experience when accessing marked data up to OFFICIAL or Business Impact Level 3 is a di

    Add to Reading List

    Source URL: www.scc.com

    Language: English - Date: 2015-04-24 05:55:19
    128Gernot Heiser / L4 microkernel family / Formal verification / Real-time operating systems / Kernel / Computer security / Integrity / Mach / Ring / Computer architecture / Trusted computing base / Microkernel

    seL4 for Dependable Systems Software Developing dependable systems requires built-in security and safety at all levels of the system, including in the lowest-level system software: the operating system and device access

    Add to Reading List

    Source URL: sel4.systems

    Language: English - Date: 2014-09-23 22:58:53
    129Cloud infrastructure / Cloud storage / Data center / Computer security / Cloud communications / IBM cloud computing / Cloud computing / Computing / Centralized computing

    G-Cloud Infrastructureas-a-Service Secure scalable pay as you use cloud services The trusted way to deploy your IT Not all Infrastructure-as-a-Service (IaaS) is the same. As a buyer you should take great care in selectin

    Add to Reading List

    Source URL: www.scc.com

    Language: English - Date: 2015-04-24 06:00:04
    130IEEE standards / IBM AIX / Unix / HP-UX / POSIX / Sun Microsystems / Solaris / Trusted operating system / Single UNIX Specification / Software / Computing / System software

    MR. PAMU KUMAR SWAMY SUMMARY Over 20 years of experience in Information Technology Infrastructure management (IMS) as principal technical consultant for major commercial open systems and open source systems, data storage

    Add to Reading List

    Source URL: www.elucitsoftware.com

    Language: English - Date: 2012-03-09 23:37:04
    UPDATE