"Plaintext" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 17 of 24 - About 235 Essays
  • Satisfactory Essays

    Wifi Hotspots

    • 7485 Words
    • 30 Pages

    GPG-agent based secure password cache for Subversion Version Control System BITS ZG629T: Dissertation by Senthil Kumaran 2008HZ12370 Dissertation work carried out at CollabNet Software Private Limited‚ Chennai BIRLA INSTITUTE OF TECHNOLOGY & SCIENCE PILANI (RAJASTHAN) October 2010 GPG-agent based secure password cache for Subversion Version Control System BITS ZG629T: Dissertation by Senthil Kumaran 2008HZ12370 Dissertation work carried out at CollabNet Software Private

    Premium Open source

    • 7485 Words
    • 30 Pages
    Satisfactory Essays
  • Powerful Essays

    Asymmetric Encryption

    • 6805 Words
    • 28 Pages

    V O L U M E 2 ‚ N U M B E R 1 — S P R I N G 1 9 9 6 CryptoBytes R S A L A B O R A T O R I E S ’ Contents 1 Asymmetric E c y t o :E o u i n nrpin vlto and Enhancements 2 Eio’ Nt dtrs oe 7 PayWo and rd Mc Mn: i ro i t Two Simple Mc i ropayment Schemes 12 Message Authentication Using Hash Functions: the HMAC Construction 16 Announcements The technical newsletter of RSA Laboratories‚ a division of RSA Data Security‚ Inc. A sy m m e tri c E n c ry p ti o n : Ev o lu ti o n a

    Premium RSA Cryptography

    • 6805 Words
    • 28 Pages
    Powerful Essays
  • Best Essays

    CB Hart Law Firm: An Information Security Report November 2011 Business Information Systems Salford Business School TABLE OF CONTENTS: INTRODUCTION pages number 1. MAIN CONTENT 1.1. Information security from business perspective 2-4 1.2. Value of information 4 1.3. Information security threats and risks: 4-5 1.3.1.Theft 5-6 1.3.2.Fraud 6 1.3.3.Malicious damage 6 1.3.4.Incompetence and mistakes 7 1.3.5. Accidents and disasters 7

    Premium Information security Security Computer security

    • 3482 Words
    • 14 Pages
    Best Essays
  • Powerful Essays

    Subasree & Sakthivel ● Design of a New Security Protocol IJRRAS 2 (2) ● February 2010 DESIGN OF A NEW SECURITY PROTOCOL USING HYBRID CRYPTOGRAPHY ALGORITHMS S. Subasree and N. K. Sakthivel School of Computing‚ Sastra University‚ Thanjavur – 613401‚ Tamil Nadu‚ INDIA. ABSTRACT A Computer Network is an interconnected group of autono mous computing nodes‚ which use a well defined‚ mutually agreed set of rules and conventions known as protocols‚ interact with one -another meaningfully

    Premium Cryptography

    • 3590 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Exam Final ECOM 320

    • 3983 Words
    • 11 Pages

    continuity plan: A plan that keeps the business running after a disaster occurs. Each function in the business should have a valid recovery capability plan. Certificate authority (CA): Third parties that issue digital certificates. Ciphertext: a plaintext message after it has been encrypted into a machine-readable form. Confidentiality: Assurance data privacy and accuracy. Keeping private or sensitive information from being disclosed to unauthorized individuals‚ entities‚ or processes. Cybercrime:

    Free Internet Computer network Social network

    • 3983 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Company Policy

    • 3843 Words
    • 16 Pages

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan‚ which can be implemented to define optimal security architecture for the selected business scenario. Sunica Music and Movies will be implementing the best and affordable security measure and disaster recovery plan that is available. Our company will install the best firewall and security that will ensure that our customers and our company data are protected

    Premium Access control Information security Computer security

    • 3843 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    War Driving Attack

    • 4214 Words
    • 17 Pages

    Network Attack Assignment (B) | May 7 | | | Table of Contents Table of figures 2 Introduction 3 Brief History 3 Tools used to War Drive 4 Why War Dialling? 4 T.J.Maxx Hacked 4 Legality United States 6 Legality United Kingdom 7 T.J. Maxx response 7 The Bust! 8 Conclusion 10 Works Cited 13 Appendix A 14 Vulnerability Note VU#723755 14 Table of figures Figure 1 Albert Gonzalez 4 Figure 2 Wireless Manufactures vulnerable 12 Introduction The organisational security

    Premium Wi-Fi Wireless access point Wireless networking

    • 4214 Words
    • 17 Pages
    Powerful Essays
  • Better Essays

    report on gsm

    • 4305 Words
    • 18 Pages

    HATHKHOWAPARA‚ AZARA‚ GUWAHATI-17 DEPARTMENT OF APPLIED ELECTRONICS & INSTRUMENTATION ENGINEERING GENERAL PROFICIENCY TOPIC-GSM Group members- Kaushik Thakuria Roll no-58 Dipankar Choudhury Roll no-42 ACKNOWLEDGEMENT We would like to express our profound gratitude to T.K.B.Bhattacharya‚ Principal‚ Girijananda Chowdhury Institute of Management and Technology‚ Guwahati‚ for permitting us to carry

    Premium GSM Mobile phone

    • 4305 Words
    • 18 Pages
    Better Essays
  • Better Essays

    IS3220 Final Project: Network Security Plan Chris Wiginton‚ Jose Rosado ITT Technical Institute‚ Tampa FL Instructor: Sherman Moody 18 November‚ 2014 Network Security Plan INTRODUCTION (Purpose and Intent) The Corporation Tech IT Network Security Plan establishes guidelines for IT practices used on a day to day basis to provide a secure and robust computing environment. These practices are used in order to protect the mission‚ operation‚ and reputation of Corporation Tech System and its information

    Premium Security Information security Computer security

    • 4134 Words
    • 12 Pages
    Better Essays
  • Good Essays

    A Quick Rundown of Python

    • 3980 Words
    • 16 Pages

    I got bored and decided to write an attempt at a bare-minimum Python tutorial for this class. I’m subscribed by email and pretty free today‚ so I’ll check back if anyone has any questions. I’m no pro‚ but I’ve been coding in Python recreationally for a couple years now (and I actually try to keep up with what actual pros are saying) so I have some idea what I’m doing. I did this assignment in a few hours‚ including at least 45 minutes of which was kludging my way around Unicode problems that I’m

    Premium Python Object-oriented programming Java

    • 3980 Words
    • 16 Pages
    Good Essays
Page 1 14 15 16 17 18 19 20 21 24