Trusted system

Results: 509



#Item
181Network architecture / Network virtualization / Internet security / Virtual private network / Computer network / Virtual network / Virtualization / Client–server model / Cloud computing / Computing / Computer network security / System software

Trusted Networks are Everything Disclaimer This presentation has been prepared for the consideration of potential investors by iWebGate Technology Limited (“the Company”) and does not carry any right of publication

Add to Reading List

Source URL: www.iwebgate.com

Language: English - Date: 2015-03-08 19:41:24
182Microkernel / Trusted computing base / L4 microkernel family / Monolithic kernels / Virtual machines / Gernot Heiser / Kernel / Embedded system / Linux kernel / Computer architecture / System software / Software

Secure Embedded Systems Need Microkernels Gernot Heiser National ICT Australia∗ and University of New South Wales Sydney, Australia

Add to Reading List

Source URL: www.ok-labs.com

Language: English - Date: 2010-10-07 14:23:41
183Gernot Heiser / L4 microkernel family / Formal verification / Real-time operating systems / Kernel / Computer security / Integrity / Mach / Ring / Computer architecture / Trusted computing base / Microkernel

seL4 for Dependable Systems Software Developing dependable systems requires built-in security and safety at all levels of the system, including in the lowest-level system software: the operating system and device access

Add to Reading List

Source URL: sel4.systems

Language: English - Date: 2014-09-23 22:58:53
184Evaluation / Formal methods / Microkernel / L4 microkernel family / Trusted computing base / Gernot Heiser / Formal verification / Kernel / Evaluation Assurance Level / Computer architecture / System software / Computing

Your System is Secure? Prove it! Gernot Heiser NICTA∗ and University of New South Wales and Open Kernel Labs Sydney, Australia [removed]

Add to Reading List

Source URL: www.ok-labs.com

Language: English - Date: 2010-10-07 14:22:41
185Aconex / Information technology management / Business / Technology / Document management system / Construction collaboration technology / Building / Construction / Project management software

One trusted platform. All your project information. The most trusted and widely used online collaboration platform for government and infrastructure projects. Public programs present unique

Add to Reading List

Source URL: www.aconex.com

Language: English - Date: 2014-07-14 15:35:52
186Out-of-band management / Intel vPro / Intel Core / Intel / X86 virtualization / Platform Controller Hub / Trusted Execution Technology / Multi-channel memory architecture / Serial Digital Video Out / Computer hardware / Computing / System software

Platform brief Intel® Core™ i7, Core™ i5 and Core™ i3 Processors with Intel® Q67 Express and Intel® B65 Express Chipsets Embedded Computing 2nd Generation Intel® Core™ i7-2600, Intel® Core™

Add to Reading List

Source URL: download.intel.com

Language: English - Date: 2011-01-05 13:27:03
187Rational temperament / Mind / Human behavior / Psychology / Getting Things Done / Personal development / Trusted system

1 Tinderbox & “The Trusted System” Merlin Mann 43 Folders

Add to Reading List

Source URL: www.43folders.com

Language: English - Date: 2012-04-11 15:22:37
188Directory services / Solaris Trusted Extensions / Internet protocols / Sun Java System Directory Server / Extension / Solaris / Lightweight Directory Access Protocol / Oracle Database / Software / Computing / Proprietary software

Oracle® Solaris Trusted Extensions Configuration and Administration Part No: 821–1482–02 November 2011

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2012-02-22 10:24:59
189Computing / VCloud / Virtual machine / NetApp / VMware ESX / EMC NetWorker / System software / VMware / Software

TRUSTED> TO PROTECT YOUR DATA[removed]Powered by Profitability.net

Add to Reading List

Source URL: appica.com

Language: English - Date: 2012-10-12 16:19:08
190Trusted computing / Cryptography / Virtual machines / Business law / Copyright law / Trusted Platform Module / Cloud computing / Grid computing / VMware / System software / Computer security / Software

CHAPTER 1 INTRODUCTION 1.1

Add to Reading List

Source URL: eprints.utm.my

Language: English - Date: 2012-07-15 20:40:51
UPDATE