Information security

Results: 50180



#Item
51/********************************************************************** CertAgent® Command Line Interface (CACLI) Version: 1.0.0 Date: 21 June 2005 Authors: Jonathan Schulze-Hewett Copyright ©2005 Information Security

/********************************************************************** CertAgent® Command Line Interface (CACLI) Version: 1.0.0 Date: 21 June 2005 Authors: Jonathan Schulze-Hewett Copyright ©2005 Information Security

Add to Reading List

Source URL: www.infoseccorp.com.

Language: English - Date: 2018-01-16 08:16:27
    52INSE 6180 Security and Privacy Implications of Data Mining (4 credits) 1. General Information   

    INSE 6180 Security and Privacy Implications of Data Mining (4 credits) 1. General Information   

    Add to Reading List

    Source URL: dmas.lab.mcgill.ca

    Language: English - Date: 2013-08-16 01:59:33
      53The Information Security Specialist  02 Appin Technologies Appin

      The Information Security Specialist 02 Appin Technologies Appin

      Add to Reading List

      Source URL: www.appincoimbatore.com

      Language: English - Date: 2018-01-24 06:25:47
        54Dear ICCS Advisors and Stakeholders, As 2014 comes to a close, the Information, Communication and Cyber Security (ICCS) team wish all of you a Merry Christmas and Happy New Year and would like share a few highlights from

        Dear ICCS Advisors and Stakeholders, As 2014 comes to a close, the Information, Communication and Cyber Security (ICCS) team wish all of you a Merry Christmas and Happy New Year and would like share a few highlights from

        Add to Reading List

        Source URL: smartgrid.epri.com

        Language: English - Date: 2018-04-23 15:23:30
          55A Cryptographic Analysis of the WireGuard Protocol Benjamin Dowling and Kenneth G. Paterson Information Security Group Royal Holloway, University of London ,

          A Cryptographic Analysis of the WireGuard Protocol Benjamin Dowling and Kenneth G. Paterson Information Security Group Royal Holloway, University of London ,

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2018-01-18 13:44:36
            56SMART, SECURE NETWORKS OF CONNECTED PEOPLE SECURE INFORMATION SHARING Cyber-security information sharing platform designed for secure cross-organisational collaboration and collaborative intelligence analysis.

            SMART, SECURE NETWORKS OF CONNECTED PEOPLE SECURE INFORMATION SHARING Cyber-security information sharing platform designed for secure cross-organisational collaboration and collaborative intelligence analysis.

            Add to Reading List

            Source URL: www.surevine.com

            Language: English - Date: 2016-11-15 11:52:23
              57Internet Security Protect Yourself Online Carver State Bank is committed to making Online Banking and Online Bill Payment safe when you access your account information. Below are some things you can do online that will h

              Internet Security Protect Yourself Online Carver State Bank is committed to making Online Banking and Online Bill Payment safe when you access your account information. Below are some things you can do online that will h

              Add to Reading List

              Source URL: www.carverstatebank.com

              Language: English - Date: 2013-10-09 15:51:56
                58Using CertAgent™ for Strong User Authentication in Check Point VPN-1 Copyright© 2002 Information Security Corporation. All rights reserved.  This document describes how to set up strong authentication between a SecuRe

                Using CertAgent™ for Strong User Authentication in Check Point VPN-1 Copyright© 2002 Information Security Corporation. All rights reserved. This document describes how to set up strong authentication between a SecuRe

                Add to Reading List

                Source URL: www.infoseccorp.com.

                Language: English - Date: 2018-01-16 08:16:26
                  59Attack-preserving Security Protocol Transformations Binh Thanh Nguyen, David Basin, and Christoph Sprenger Institute of Information Security, ETH Zurich, Switzerland {thannguy,basin,sprenger}@inf.ethz.ch  Abstract. The r

                  Attack-preserving Security Protocol Transformations Binh Thanh Nguyen, David Basin, and Christoph Sprenger Institute of Information Security, ETH Zurich, Switzerland {thannguy,basin,sprenger}@inf.ethz.ch Abstract. The r

                  Add to Reading List

                  Source URL: people.inf.ethz.ch

                  Language: English - Date: 2014-04-16 16:25:39
                    60

                    Subject: Request to Attend Black Hat USA Conference 2018 Dear [decision maker name], I’m writing to request your approval for me to attend the Black Hat USA Information Security Conference to be held August 4-9, 2018 i

                    Add to Reading List

                    Source URL: www.blackhat.com

                    Language: English - Date: 2018-05-11 13:28:29