Cryptographic software

Results: 2705



#Item
51Cryptography / Public-key cryptography / Public key infrastructure / Cryptographic protocols / Cryptography standards / X.509 / Internet Standards / PKCS / Code signing / Portable Executable / Public key certificate / Cryptographic Message Syntax

Windows Authenticode Portable Executable Signature Format Version 1.0 — March 21, 2008  Abstract Authenticode® is a digital signature format that is used to determine the origin and integrity of software binaries. A

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2008-07-29 12:01:34
52CE318/CE818: High-level Games Development Assignment Submission Procedure Due to the latest problems with the file capacity in Faser, we are going to establish the following procedure to upload your games so we can downl

CE318/CE818: High-level Games Development Assignment Submission Procedure Due to the latest problems with the file capacity in Faser, we are going to establish the following procedure to upload your games so we can downl

Add to Reading List

Source URL: orb.essex.ac.uk

Language: English - Date: 2015-12-05 03:37:29
53Analysis of an encrypted HDD J. Czarny, R. Rigo May 11, 2015 Abstract The idea of this presentation is to debunk the myth that analyzing the security of hardware is difficult. From the perspective of a software reverse e

Analysis of an encrypted HDD J. Czarny, R. Rigo May 11, 2015 Abstract The idea of this presentation is to debunk the myth that analyzing the security of hardware is difficult. From the perspective of a software reverse e

Add to Reading List

Source URL: www.sstic.org

Language: English - Date: 2015-05-26 11:04:26
54FreeIPA Training Series  SSSD and OpenSSH Integration Jan Cholasta

FreeIPA Training Series SSSD and OpenSSH Integration Jan Cholasta

Add to Reading List

Source URL: www.freeipa.org

Language: English - Date: 2013-06-06 07:16:17
55ENTERPRISE MANAGEMENT! WHAT E? Adding the ‘E’ to FOSS Cryptographic Data Storage  Definitions

ENTERPRISE MANAGEMENT! WHAT E? Adding the ‘E’ to FOSS Cryptographic Data Storage Definitions

Add to Reading List

Source URL: rvasec.com

Language: English - Date: 2015-07-01 07:40:04
56Encryption Procedure  Removable Media Encryption – User Guide (Revision Date: Table of Contents

Encryption Procedure Removable Media Encryption – User Guide (Revision Date: Table of Contents

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2014-11-17 11:50:26
57Proceedings Template - WORD

Proceedings Template - WORD

Add to Reading List

Source URL: womencourage.acm.org

Language: English - Date: 2016-08-09 09:13:52
581  Certificates /etc/ssl/certs $ cat GlobalSign_Root_CA.pem -----BEGIN TRUSTED CERTIFICATE----MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkG

1 Certificates /etc/ssl/certs $ cat GlobalSign_Root_CA.pem -----BEGIN TRUSTED CERTIFICATE----MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkG

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-03-29 16:43:01
59ALOHA LOAD BALANCER MANAGING SSL ON THE FRONTEND “APPNOTE” #0021 ― MANAGING SSL ON THE FRONTEND This application note is intended to help you implement SSL management on the frontend (connection to an HTTP server)

ALOHA LOAD BALANCER MANAGING SSL ON THE FRONTEND “APPNOTE” #0021 ― MANAGING SSL ON THE FRONTEND This application note is intended to help you implement SSL management on the frontend (connection to an HTTP server)

Add to Reading List

Source URL: www.haproxy.com

Language: English - Date: 2014-04-28 06:44:16
60VIDEO AS EVIDENCE: TECH TOOLS TECH TOOLS FOR TRANSFERRING FILES  Filming for human rights can be dangerous. It can put you, the people you are filming

VIDEO AS EVIDENCE: TECH TOOLS TECH TOOLS FOR TRANSFERRING FILES Filming for human rights can be dangerous. It can put you, the people you are filming

Add to Reading List

Source URL: librarywebfiles.s3.amazonaws.com

Language: English - Date: 2015-05-12 14:38:07