Financial Cryptography - 0 views
-
Financial Cryptography
The SwitchWare Project - 0 views
-
The SwitchWare Project Active Network Research at Penn and Bellcore Active networks explore the idea of allowing routing elements to be extensively programmed by the packets passing through them. This allows computation previously possible only at endpoints to be carried out within the network itself, thus enabling optimizations and extensions of current protocols as well as the development of fundamentally new protocols. Welcome to the SwitchWare home page, describing the Active Networks research effort underway in the Penn Department of Computer and Information Science and Bellcore as well as pointers to related material.
SAML Single Sign-On (SSO) Service for Google Apps - Google Apps APIs - Google Code - 0 views
-
SAML Single Sign-On (SSO) Service for Google Apps
Your dashboard on idproxy.net - 0 views
-
dashboard on idproxy.net
Mass murder in the skies: was the plot feasible? | The Register - 0 views
-
Mass murder in the skies: was the plot feasible?
IT Controls: How and Where Do You Start? - 0 views
-
As Stephen Katz, former CISO of Citibank, once said, "Controls don't slow the business down; like brakes on a car, controls allow you to go faster."
myNetWatchman - Network Intrusion Detection and Reporting - 0 views
-
Q: What is myNetWatchman? A: myNetWatchman collects, analyzes and reports malicious access attempts to ISPs, who can then take action against the offending machines. [Back to top] Q: How does it work? A: A small client-side application runs as a background application on your system; reading your firewall logs, and creating near-real-time reports that are relayed to the myNetwatchman servers for analysis. [Back to top]
ISO27k infosec management standards - 0 views
-
ISO27k standards provide generally accepted good practice guidance on Information Security Management Systems to protect the confidentiality, integrity and availability of the information content and information systems
Companies need to sell security to business-unit execs - Network World - 0 views
-
Stamp says that business units must accept responsibility for the security of the data they generate and control to head off data leaks. "IT people are data custodians, not owners," Stamp says. "We need to transfer responsibility to business people
DRM-roll for consumer privacy protection - Network World - 0 views
-
Through DRM technologies, consumers engaging in electronic commerce could grant vendors and suppliers a license to access and utilize certain aspects of the consumers’ data. This would enable a consumer to grant a read/write license to some creditors, perhaps as a function of a mortgage agreement, and provide a read-only license to a limited subset of the data for simple transactions such as shipping agreements and online orders. Such a license would empower consumers to prevent entities from misusing or reselling consumer information.
Personal Identity Provider (PIP) - Download the Seatbelt - 0 views
-
VeriSign's OpenID SeatBelt Plugin
Coordinated Russia vs Georgia cyber attack in progress | Zero Day | ZDNet.com - 0 views
-
Coordinated Russia vs Georgia cyber attack in progress
What a Botnet Looks Like - CSO Online - Security and Risk - 0 views
-
What a Botnet Looks Like
Laptops: How to Thief-Proof Your Laptop - 0 views
-
How to Thief-Proof Your Laptop
GOES - Global Online Enrollment System - 0 views
-
Global Online Enrollment System allows registered users to enter their own applications for U.S. Customs and Border Protection (CBP) Trusted Traveler Programs
‹ Previous
21 - 40
Next ›
Last »
Showing 20▼ items per page