- Subscribe to this page:
- RSS
- Email Alert
digital signatures
(6 results)-
Book chapters
Protect sensitive communications and data with these simple and affordable encryption techniques
Jul 2006
Computer Security Basics, Second Edition offers a complete introduction to computer security for anyone involved with computer security, including security administrators, system administrators,...
Provided by O'Reilly Media
-
Book chapters
Hackproof XML with digital signatures
Jan 2007
Digital signatures are widely used as security tokens, and not just in XML. A digital signature provides a mechanism for assuring integrity of data, the authentication of its signer, and the...
Provided by Syngress
-
Book chapters
Secure your e-mail with OpenPGP
Jul 2007
Governments, major manufacturers, and medical facilities around the world trust their secure communications to PGP (Pretty Good Privacy). While PGP works impressively when all is in order, it...
Provided by No Starch Press
-
Downloads
Windows Vista Security Guide: Encryption
Oct 2007
Securing data is one of your most important responsibilities. TechRepublic Pro's Encryption Security Guide reviews the fundamentals of encrypting Windows Vista data and helps you gauge your...
Provided by TechRepublic Pro
-
Downloads
How do I... Encrypt files with GPG4Win?
Sep 2008
File encryption has been a key component to safe business practices for a long time. Whether it is keeping the prying eyes of competitors out of your critical product information or keeping the...
Provided by Jack Wallen
-
Downloads
How do I... Create and use a Microsoft CardSpace personal digital identification card?
Sep 2007
Digital identification and, more importantly, the ability to exchange certified digital information, is the mantra of many network security strategies. With the proliferation of open...
Provided by Mark W. Kaelin
-
Downloads
How do I... Encrypt files with GPG4Win?
Sep 2008
File encryption has been a key component to safe business practices for a long time. Whether it is keeping the prying eyes of competitors out of your critical product information or keeping the...
Provided by Jack Wallen
-
Downloads
Windows Vista Security Guide: Encryption
Oct 2007
Securing data is one of your most important responsibilities. TechRepublic Pro's Encryption Security Guide reviews the fundamentals of encrypting Windows Vista data and helps you gauge your...
Provided by TechRepublic Pro
-
Downloads
How do I... Create and use a Microsoft CardSpace personal digital identification card?
Sep 2007
Digital identification and, more importantly, the ability to exchange certified digital information, is the mantra of many network security strategies. With the proliferation of open...
Provided by Mark W. Kaelin
-
Book chapters
Secure your e-mail with OpenPGP
Jul 2007
Governments, major manufacturers, and medical facilities around the world trust their secure communications to PGP (Pretty Good Privacy). While PGP works impressively when all is in order, it...
Provided by No Starch Press
-
Book chapters
Hackproof XML with digital signatures
Jan 2007
Digital signatures are widely used as security tokens, and not just in XML. A digital signature provides a mechanism for assuring integrity of data, the authentication of its signer, and the...
Provided by Syngress
-
Book chapters
Protect sensitive communications and data with these simple and affordable encryption techniques
Jul 2006
Computer Security Basics, Second Edition offers a complete introduction to computer security for anyone involved with computer security, including security administrators, system administrators,...
Provided by O'Reilly Media
-
Book chapters
Protect sensitive communications and data with these simple and affordable encryption techniques
Jul 2006
Computer Security Basics, Second Edition offers a complete introduction to computer security for anyone involved with computer security, including security administrators, system administrators,...
Provided by O'Reilly Media
-
Book chapters
Hackproof XML with digital signatures
Jan 2007
Digital signatures are widely used as security tokens, and not just in XML. A digital signature provides a mechanism for assuring integrity of data, the authentication of its signer, and the...
Provided by Syngress
-
Book chapters
Secure your e-mail with OpenPGP
Jul 2007
Governments, major manufacturers, and medical facilities around the world trust their secure communications to PGP (Pretty Good Privacy). While PGP works impressively when all is in order, it...
Provided by No Starch Press
-
Downloads
Windows Vista Security Guide: Encryption
Oct 2007
Securing data is one of your most important responsibilities. TechRepublic Pro's Encryption Security Guide reviews the fundamentals of encrypting Windows Vista data and helps you gauge your...
Provided by TechRepublic Pro
-
Downloads
How do I... Encrypt files with GPG4Win?
Sep 2008
File encryption has been a key component to safe business practices for a long time. Whether it is keeping the prying eyes of competitors out of your critical product information or keeping the...
Provided by Jack Wallen
-
Downloads
How do I... Create and use a Microsoft CardSpace personal digital identification card?
Sep 2007
Digital identification and, more importantly, the ability to exchange certified digital information, is the mantra of many network security strategies. With the proliferation of open...
Provided by Mark W. Kaelin
Keep Up with TechRepublic
Submit a Paper
Get your content listed in our directory!
Our directory is the largest library of vendor-supplied technical content on the Web. It’s also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors’ papers here - shouldn’t they find yours, too? It's FREE so click here and submit your white paper, case study, data sheet, research report, or other document today!