Search
Selected: P

Prompt authentication

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Propagating black hole shunts to remote routers with split...

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Propagation of viruses through an information technology...

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Propagation of viruses through an information technology...

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Propagation of viruses through an information technology...

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Proprietary portable audio player system for protecting...

Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Protected execution environments within a computer system

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Protected execution environments within a computer system

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Protected media path and refusal response enabler

Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Protected media path and refusal response enabler

Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Protected mutual authentication over an unsecured wireless...

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Protecting a computer coupled to a network from malicious...

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Protecting a computer coupled to a network from malicious...

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Protecting a computer that provides a Web service from malware

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Protecting a data processing system from attack by a vandal...

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Protecting a service provider from abuse

Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Protecting against distributed denial of service attacks

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Protecting against software piracy

Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Protecting against spoofed DNS messages

Information security – Access control or authentication – Network
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Protecting computer users from online frauds

Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate

  [ 0.00 ] – not rated yet Voters 0   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.