Hardware Security Module CodingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Hardware Security Module Coding returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Storage Security
 •   Application Security
 •   Security Policies
 •   Testing and Analysis
 •   Data Center Management
 •   Virtualization
 •   Application Management and Maintenance
 •   Embedded Application Development

Related Searches
 •   Documents Hardware Security
 •   Hardware Implementing
 •   Hardware Make
 •   Hardware Payment
 •   Hardware Security Research
 •   Hardware Security Test
 •   History Hardware
 •   Knowledge Hardware Security
 •   Outsource Hardware Security
 •   Resources Hardware Security Module
Advertisement

ALL RESULTS
1 - 25 of 488 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Forum XWall - Web Services Security Firewalls - Prevent Unauthorized Access by Forum Systems

Forum XWall™ is the industy's first Web Services Firewall equipped with data authentication as well as XML intrusion prevention to actively protect against unauthorized access, XML viruses, data corruption and denial of Web service attacks. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

Forum Sentry™ - Web Services Security Gateway - Drive Return on Investment by Forum Systems

Forum Sentry™ provides a security infrastructure that drives a return on investment by enabling secure XML and Web services communications for mission critical applications. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

Veracode eLearning Subscription by Veracode, Inc.

May 07, 2010 - (Free Research)
Veracode’s eLearning contains over 30 hours of secure training content in a web-based training module format. The program is designed specifically for developers and security personnel to meet formal training and competency testing requirements. It also contains a comprehensive knowledgebase on secure software development. Read on to learn more. 
(TRAINING GUIDE) READ ABSTRACT |

BIG-IP Application Security Manager™ by F5 Networks

The BIG-IP Application Security Manager delivers the industry’s foremost comprehensive application delivery security solution with the option to deliver both application delivery and security together. The ASM provides application layer protection from targeted and generalized application attacks to ensure that applications are always available. 
(HARDWARE PRODUCT)

The GeoTAX ® Enterprise Tax Management solution by Pitney Bowes Group 1 Software

The GeoTAX ® Enterprise Tax Management solution provides you with the necessary tools to centralize all your corporate tax jurisdiction processing needs and supports critical tax compliance issues. 
(SOFTWARE PRODUCT)

Trusted Computing: Leveraging Hardware Security in 350 Million Platforms by Wave Systems Corp.

August 24, 2010 - (Free Research)
Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, and so much more. 
(VIDEOCAST) READ ABSTRACT |

Deutsche Post DHL Case Study Enterprise Agility through DevOps by CollabNet

December 31, 2011 - (Free Research)
Read this brief case study to discover how global company Deutsche Post DHL leveraged an agile application lifecycle management (ALM) platform to implement better IT governance, streamline collaboration and sharing software modules, automate and standardize application delivery, and gain visibility into source code and software partner information. 
(CASE STUDY) READ ABSTRACT |

Sun Storage J4000 Array Family Scalable, Reliable and Cost-effective Solutions for Open Storage Infrastructures by Sun Microsystems, Inc.

December 2008 - (Free Research)
The Sun Storage J4200 array provides high availability, cost-effective 2U storage and supports up to 12 3.5-inch SATA or SAS hard drives. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation by ComputerWeekly.com

June 2012 - (Free Research)
In this week’s Computer Weekly, our latest Buyer's Guide examines best practice in desktop virtualisation. We ask if a six-year-old technology could be a key to tackling IT security threats. And we look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Read the issue now. 
(EZINE) READ ABSTRACT |

Windows Azure Platform Security Essentials: Module 1 - Security Architecture by Microsoft

December 2010 - (Free Research)
In this video module, Graham Calladine, Security Architect with Microsoft Services partners with the Security Talk Series to describe the security features of the Windows Azure platform, resources available to protect applications and data running on the Microsoft cloud and SQL Azure security and authentication options. 
(WEBCAST) READ ABSTRACT |

Reduce CPU Usage with 'SMART' SQL by BMC Software, Inc.

November 2009 - (Free Research)
This paper discusses how and why to design SQL that will reduce the number of times calls are made to DB2. We'll look at how to write SMART applications rather than writing applications that act like generic I/O modules to DB2, properly tune SMART SQL, and how to exploit SQL and application features in DB2 on z/OS version 8 and 9. 
(WHITE PAPER) READ ABSTRACT |

zCisco 1800 Series Integrated Services Routers: Cisco 1841 Router (Modular) by Cisco Systems, Inc.

The Cisco 1841 router offers embedded hardware-based encryption enabled by an optional Cisco IOS Software security image. 
(HARDWARE PRODUCT)

Simpana 9 Datasheet by CommVault Systems, Inc.

November 2010 - (Free Research)
Simpana software simplifies an IT organization’s ability to manage data across its lifecycle and integrated modules for Backup & Recovery, Archive, Replication, Resource Management and Search. 
(DATA SHEET)

Plug & Play™ Gigabit Ethernet Media Conversion Module by Transition Networks, Inc.

September 2008 - (Free Research)
The Plug & Play Universal Systems Media Converter Module offers the best of both worlds - easy fiber optic scalability and future proofing with today's cost-effective copper electronics. 
(ARTICLE) READ ABSTRACT |

Security Best Practices for Developing Windows Azure Applications by Microsoft

November 2010 - (Free Research)
Are you a software designer, architect, developer or tester interested in secure cloud computing solutions?  Download this breakthrough paper focusing on the security challenges and recommended approaches to design and develop more secure applications for Microsoft's Windows Azure platform.  
(WHITE PAPER) READ ABSTRACT |

Cisco 2800 Series by Cisco Systems, Inc.

The Cisco 2800 Series features the ability to deliver multiple high-quality simultaneous services at wire speed up to multiple T1/E1/xDSL connections. 
(HARDWARE PRODUCT)

Code Signing: Leveraging HSMs to Safeguard Trust and Protect Your Business by SafeNet, Inc.

February 2014 - (Free Research)
This white paper explains how code signing works and why you need to add it to your online distribution security strategy. 
(WHITE PAPER) READ ABSTRACT |

Embedded Security: Trusted Platform Module Technology Comes of Age by Utimaco Safeware

December 2005 - (Free Research)
This paper examines the benefits that TPM chips bring to security-conscious businesses, and the ways in which this technology can elevate trusted computing to higher levels, enhancing security while simplifying usability. 
(WHITE PAPER) READ ABSTRACT |

Proofpoint Messaging Security Gateway Virtual Edition by Proofpoint, Inc.

November 2006 - (Free Research)
VMware virtualization products require alternative messaging security solutions than those that support physical server software. This free trial download provides best-in-class messaging security designed specifically to support VMware products. 
(TRIAL SOFTWARE) READ ABSTRACT |

Practical Data Migration: PDMv2 by ComputerWeekly.com

September 2012 - (Free Research)
Data Migration expert Johny Morris, explains how organisations can use the PDMv2 methodology to overcome common data migration problems. 
(BOOK) READ ABSTRACT |

Sybase CEP Implementation Methodology for Continuous Intelligence by Sybase, an SAP company

October 2010 - (Free Research)
This paper discusses the Sybase CEP Implementation Methodology, which offers analytic developers a set of best practices for implementing Continuous Intelligence using Complex Event Processing. Sybase CEP provides a structured yet flexible approach to rapidly build Continuous Intelligence projects and deliver more analytic modules over time. 
(WHITE PAPER) READ ABSTRACT |

Toad™ for Oracle® Tips and Tricks by Dell Software

July 2013 - (Free Research)
Toad™ for Oracle is a staple for database developers, but regardless of your role in an organization, if you use Oracle, then there's something Toad can offer you. In this comprehensive white paper, explore some of the Toad fundamentals as well as the features and capabilities of the individual Toad editions and modules. 
(WHITE PAPER) READ ABSTRACT |

S3 Control: Adding Control to Change Management by Solidcore Systems, Inc.

There is a gap between change activity & the documented Change Management process. Solidcore S3 Control adds control to change management. It provides visibility into changes in the enterprise IT infrastructure, accountability for employees deploying ticketed changes, & enforcement of change policies. It is available on IBM platforms. 
(SOFTWARE PRODUCT)

The Next Generation of Static Analysis: Boolean Satisfiability and Path Simulation by Coverity

March 2008 - (Free Research)
This white paper will provide a brief overview of the history of static analysis and explain how the use of SAT in static analysis is enabling developers to improve the quality and security of their code. 
(WHITE PAPER) READ ABSTRACT |

Cisco MDS 9000 Family: Total Investment Protection by Cisco Systems, Inc.

November 2008 - (Free Research)
As discussed in this document, the Cisco® MDS 9000 Family provides the leading high-density, highbandwidth storage networking solution along with Integrated Fabric Applications to support dynamic data center requirements. 
(ARTICLE) READ ABSTRACT |

1 - 25 of 488 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts