Trusted computing

Results: 881



#Item
811Intel® vPro™ Technology Reference Guide Updated for Intel® AMT 8

Intel® vPro™ Technology Reference Guide Updated for Intel® AMT 8

Add to Reading List

Source URL: downloadmirror.intel.com

Language: English - Date: 2012-08-16 17:22:23
812Trusted Computing Platform Alliance: The Mother(board) of all

Trusted Computing Platform Alliance: The Mother(board) of all

Add to Reading List

Source URL: ogobin.de

Language: English - Date: 2004-07-30 18:22:18
813In Memoriam James P. Anderson An Information Security Pioneer

In Memoriam James P. Anderson An Information Security Pioneer

Add to Reading List

Source URL: www.computer.org

Language: English - Date: 2008-01-24 16:43:08
814Techniques for Trusted Software Engineering Premkumar T. Devanbu Dept of Computer Science,

Techniques for Trusted Software Engineering Premkumar T. Devanbu Dept of Computer Science,

Add to Reading List

Source URL: ftp2.uk.postgresql.org

Language: English - Date: 1998-06-07 07:00:00
815Revisiting Software Protection P.C. van Oorschot Digital Security Group, School of Computer Science

Revisiting Software Protection P.C. van Oorschot Digital Security Group, School of Computer Science

Add to Reading List

Source URL: people.scs.carleton.ca

Language: English - Date: 2004-01-04 16:25:09
816Microsoft Word - TCG_PCSpecificSpecification_v1_1 RC3_00019[removed]].

Microsoft Word - TCG_PCSpecificSpecification_v1_1 RC3_00019[removed]].

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-04-08 17:56:56
817FEATURE SECTION: SECURITY  Enhancing IT Security

FEATURE SECTION: SECURITY Enhancing IT Security

Add to Reading List

Source URL: www.dell.com

Language: English - Date: 2006-11-06 13:33:56
818AMD’s Vision for Trustworthy Computing

AMD’s Vision for Trustworthy Computing

Add to Reading List

Source URL: www.ic.unicamp.br

Language: English - Date: 2006-10-26 13:04:44
819Essay 9  Rule-Set Modeling

Essay 9 Rule-Set Modeling

Add to Reading List

Source URL: www.acsa-admin.org

Language: English - Date: 2006-02-01 10:24:16
820The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments

The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2004-01-14 18:20:50