Next results
Dig.do provides summary information about websites
Discover the most popular sites
Search domain or keyword:

Top sites >> topics >> Computers / Security

Top Internet Sites


Computers/Security/Advisories and Patches
Computers/Security/Authentication
Computers/Security/Biometrics
Computers/Security/Chats and Forums
Computers/Security/Consultants
Computers/Security/Directories
Computers/Security/FAQs, Help, and Tutorials
Computers/Security/Firewalls
Computers/Security/Honeypots and Honeynets
Computers/Security/Internet
Computers/Security/Intrusion Detection Systems
Computers/Security/Mailing Lists
Computers/Security/Malicious Software
Computers/Security/News and Media
Computers/Security/Organizations
Computers/Security/Policy
Computers/Security/Products and Tools
Computers/Security/Public Key Infrastructure
Computers/Security/Research
Computers/Security/Virtual Private Networks
nuance.com screenshot

Nuance - Home

nuance.com
(view complete information about nuance.com)


Navigation Content United States & Canada Australia China Deutschland-Ōsterreich España France Italia Japan Nederland-Belgi New Zealand United Kingdom - Ireland United States Canada Languages Developers Careers There are no items in your cart. For...

Site position: 9386 (in .com); 14826 (Global Alexa rank)

Visit date: 2013-03-20 12:22:20




wilderssecurity.com screenshot

Wilders Security Forums - Powered by vBulletin

wilderssecurity.com
(view complete information about wilderssecurity.com)


This is a Computer Security discussion forum.

Keywords: Security,forum,bbs,discussion,bulletin board,Firewall,antivirus,privacy

Site position: 21305 (in .com); 33112 (Global Alexa rank)

Visit date: 2013-02-22 14:15:35




ca.com screenshot

CA Technologies — Business Service Innovation

ca.com
(view complete information about ca.com)


CA Technologies offers it management software and solutions for all of your business needs.

Site position: 22164 (in .com); 34430 (Global Alexa rank)

Visit date: 2013-01-10 22:03:36




unisys.com screenshot

Unisys: A worldwide information technology company

unisys.com
(view complete information about unisys.com)


software, and technology that solves critical problems for clients.

Keywords: <,p>,Unisys security outsourcing application modernization information technology cloud data center transformation end user support<,/p>, <,p>,&,nbsp,<,/p>,

Site position: 26006 (in .com); 40214 (Global Alexa rank)

Visit date: 2012-11-21 05:40:45




openid.net screenshot

OpenID Foundation website

openid.net
(view complete information about openid.net)


OpenID is a safe, faster and easier way to log in to web sites.

Keywords: openid, authentication, security, identity

Site position: 2462 (in .net); 43794 (Global Alexa rank)

Visit date: 2012-11-21 09:39:42




packetstormsecurity.org screenshot

Packet Storm

packetstormsecurity.org
(view complete information about packetstormsecurity.org)


Information Security News, Files, Tools, Exploits, Advisories and Whitepapers

Keywords: security,exploit,advisory,whitepaper,xss,csrf,overflow,scanner,vulnerability,ful l disclosure

Site position: 1423 (in .org); 47989 (Global Alexa rank)

Visit date: 2012-11-21 08:38:52




fraunhofer.de screenshot

Startseite Fraunhofer-Gesellschaft

fraunhofer.de
(view complete information about fraunhofer.de)


Die Fraunhofer-Gesellschaft ist die größte Organisation für anwendungsorientierte Forschung in Europa. Unsere Forschungsfelder richten sich nach den Bedürfnissen der Menschen: Gesundheit, Sicherheit, Kommunikation, Mobilität, Energie und Umwelt.

Keywords: Forschung, Fraunhofer, Fraunhofer Gesellschaft, Wissenschaft

Site position: 915 (in .de); 48424 (Global Alexa rank)

Visit date: 2012-11-21 18:50:44




secunia.com screenshot

Computer Security - Software Alerts - Secunia

secunia.com
(view complete information about secunia.com)


Market leaders in computer security software research ensuring business and personal users are safe from online threats. Free downloads online scans. Join the Community for advice in the forum.

Site position: 38939 (in .com); 59300 (Global Alexa rank)

Visit date: 2013-02-19 14:31:52




Welcome to myOpenID

myopenid.com
(view complete information about myopenid.com)


Skip to Content Skip to Navigation myOpenID - The free, secure OpenID server Your Personal Icon First and Largest Independent OpenID Provider Sign Up for Your OpenID Get your own OpenID and start using the last username and password you'll ever need....

Site position: 63030 (in .com); 94321 (Global Alexa rank)

Visit date: 2012-11-23 08:57:04




us-cert.gov screenshot

US-CERT - United States Computer Emergency Readiness Team

us-cert.gov
(view complete information about us-cert.gov)


US-CERT's mission is to improve the nation's cybersecurity posture, coordinate cyber information sharing, and proactively manage cyber risks to the nation.

Keywords: uscert, csirt, cert, cybersecurity, cyber security, computer security, U.S. Computer Emergency Readiness, US-CERT, cyber risks

Site position: 205 (in .gov); 95677 (Global Alexa rank)

Visit date: 2013-01-31 15:14:01




IT Security News and Security Product Reviews - SC Magazine

scmagazine.com
(view complete information about scmagazine.com)


Find the latest security news from SC Magazine US, SC Magazine online for products reviews, group test, latest news and features, security news, portals

Keywords: secure computing,news,latest news,features,product reviews,threat reports,threat stats,product group test,SC,scmagazineus.com

Site position: 76268 (in .com); 116854 (Global Alexa rank)

Visit date: 2012-11-19 07:45:56




netnanny.com screenshot

Parental Control Software by Net Nanny | Net Nanny

netnanny.com
(view complete information about netnanny.com)


Net Nanny Products from ContentWatch provide Internet Protection software, including parental controls and internet filtering software, computer cleaning utilities, anti-phishing controls, and more.

Site position: 81896 (in .com); 126862 (Global Alexa rank)

Visit date: 2012-11-25 02:34:04




The CERT Program: Anticipating and Solving the Nations Cybersecurity Challenges

cert.org
(view complete information about cert.org)


A leader in cybersecurity, the CERT Program develops security solutions to relevant network, computer, and internet security problems and contributes to national security efforts.

Site position: 5433 (in .org); 160339 (Global Alexa rank)

Visit date: 2012-11-25 20:17:32




pingidentity.com screenshot

Secure Cloud Identity Management | Ping Identity

pingidentity.com
(view complete information about pingidentity.com)


Ping Identity ® The Cloud Identity Security Leader Ping Identity® Skip to navigation . Skip to content . Contact Us Log In Blogs Language English (USA) Français (France) Deutsch (Germany) 日本の (Japanese) Products Cloud Identity Management...

Site position: 101956 (in .com); 162291 (Global Alexa rank)

Visit date: 2012-12-17 04:26:58




norman.com screenshot

As secure as it gets - Norman

norman.com
(view complete information about norman.com)


About Norman International International Danmark Deutschland España France Italia Nederland Norge Schweiz Suomi Sverige United Kingdom United States As secure as it gets Business Secure my business PCs and servers learn more Email Ensure my emails are...

Site position: 106958 (in .com); 170823 (Global Alexa rank)

Visit date: 2013-01-17 17:08:02




osvdb.org screenshot

OSVDB: The Open Source Vulnerability Database

osvdb.org
(view complete information about osvdb.org)


Loading... Search OSVDB Advanced Search Web Vuln Search Browse Vendors Project Info News About OSVDB Database Info OSVDB Tools Mangler Guide Documentation Compatibility FAQ Mailing Lists OSVDB API OSVDB Integrators Help OSVDB! Join the Effort Mangler...

Site position: 6776 (in .org); 193596 (Global Alexa rank)

Visit date: 2012-12-04 09:52:37




AuthenTec a leading provider of mobile and network security

authentec.com
(view complete information about authentec.com)


Login SEARCH Markets Mobile Systems/Wireless Networking Content Protection Semiconductor IP Government and Civil ID Access Control PCs and Peripherals Products Embedded Security DRM & Content Protection Security Solutions for Android Security Toolkits...

Site position: 129108 (in .com); 208398 (Global Alexa rank)

Visit date: 2012-11-25 19:26:51




whitehatsec.com screenshot

Website Security: Web Application Security - PCI Compliance

whitehatsec.com
(view complete information about whitehatsec.com)


Contact a WhiteHat Sales Representative | FREE. 30-day Trial. Sentinel SecurityCheck YOUR WEB SECURITY COMPANY ABOUT WHITEHAT | NEWS EVENTS | PARTNERS | RESOURCES WEBSITE SECURITY Asset ID / Risk Profiling Vulnerability Management...

Keywords: website security, web security, web application security, web app security, pci compliance

Site position: 132938 (in .com); 214980 (Global Alexa rank)

Visit date: 2013-02-21 02:03:01




morpho.com screenshot

Morpho

morpho.com
(view complete information about morpho.com)


Group's website Worldwide français Search Group's websites Safran website MorphoTrak (US) MorphoTrust (formerly L-1 Identity Solutions) Safran Sailing Team Identification e-Documents Detection About us RD References News Events Career 8 Morpho No 1 in...

Site position: 153661 (in .com); 249407 (Global Alexa rank)

Visit date: 2012-12-12 05:16:59




secureroot.com screenshot

SecureRoot Computer Security Resource. Hacking, Cryptography, Etc

secureroot.com
(view complete information about secureroot.com)


Underground computer security search engine. Covers hacking, security, cryptography, phreaking, trojans, exploits, carding, icq tools, virii, zines, warez and more...

Keywords: hacking, icq, cryptography, hotmail, trojans, cracks, bo2k,aol, firewall, warez, proxy, trojan, subseven, linux, back orifice, serials, flooding, web board, appz, yahoo, passwords, nuke, credit card, irc, netsphere, wingate, gsm,proxies, password, telnet, exploits, bomber, phreaking, spoof,nuker, crack, nukes, serial, virii, cracking, unscambler,jammer, adult check, crackers, crackz, hack, ip, sniffing, wingates, surf,exploit, nukers, anonymous, hackz, antivirus, net bus, satan,smurf attacks, teardrop, security, keyloggers, port scanner,warfare, spoofers, internet, anonymity, cryptology, pgp, virus, perl

Site position: 157620 (in .com); 256016 (Global Alexa rank)

Visit date: 2012-12-14 07:55:09




bioenabletech.com screenshot

Fingerprint Time Attendance system India, Fingerprint Scanner, Biometric Time attendance machine, Biometrics access control Security system, Fingerprint Reader with SDK, Face Iris Recognition Products Services

bioenabletech.com
(view complete information about bioenabletech.com)


Fingerprint Time Attendance system India, Fingerprint Scanner, Biometric Time attendance machine, Biometrics access control Security system, Fingerprint Reader with SDK, Face Iris Recognition Products Services

Keywords: Fingerprint Time Attendance system India, Fingerprint Scanner, Biometric Time attendance machine, Biometrics access control & Security system, Fingerprint Reader with SDK, Face & Iris Recognition Products & Services

Site position: 170749 (in .com); 277578 (Global Alexa rank)

Visit date: 2012-12-15 17:43:15




Face Recognition Homepage

face-rec.org
(view complete information about face-rec.org)


Face Recognition Homepage, relevant information in the the area of face recognition, information pool for the face recognition community, entry point for novices as well as a centralized information resource

Keywords: Face Recognition Homepage, Algorithms, Source Codes, New Papers, Databases, Interesting Papers, Highly Cited Papers, Conferences, Journals, Books, Special Issues, Research Groups, Newsgroup, Vendors, Releted Links, General Info

Site position: 10902 (in .org); 302378 (Global Alexa rank)

Visit date: 2013-01-28 17:59:57




neurotechnology.com screenshot

Fingerprint, face, eye iris, voice and palm print identification, speaker and object recognition software

neurotechnology.com
(view complete information about neurotechnology.com)


Neurotechnology offers large-scale multi-biometric AFIS SDK, PC-based, embedded, smart card fingerprint, face, eye iris, voice and palmprint identification SDK. Research and development in AI and robotics.

Site position: 213298 (in .com); 346259 (Global Alexa rank)

Visit date: 2012-12-15 23:52:57




coresecurity.com screenshot

Core Security

coresecurity.com
(view complete information about coresecurity.com)


Core Security Technologies provides penetration testing software solutions that expose vulnerabilities, measure operational risk and assure security effectiveness.

Keywords: penetration test, penetration testing, penetration testing product, ethical hacking, exploits, exploit, hacking, hacker tools, pen testing, pen test, pen testing tool, CORE IMPACT, vulnerability management, vulnerability scanner, vulnerability scanners, intrusion detection systems, IDS, intrusion protection systems, IPS, IPS testing, IDS testing, certified ethical hacker, CEH, fuzzing, fuzzer, commercial-grade exploits, Metasploit, buffer overflow, heap overflow, code execution, stack overflow, integer overflow, Windows exploit, Windows exploits, payload, shellcode, web application security, pivoting, client-side exploits, client-side attacks, Black Hat, PCI Compliance, IPS evasion, IDS evasion, network security auditing, exploit network vulnerabilities, pivoting, penetration testing services, network security advisories, automated pen testing, automated penetration testing, penetration testing techniques, information security advisories, network advisories, network attacks, network security, network security risk, vulnerability assessment, penetration testing framework, hacker methodologies, network vulnerabilities, network vulnerability assessment, network vulnerability detection, network vulnerability scanning, information security risk assessment, information security penetration testing, information security vulnerabilities, information security consultants, information security consulting, information security consulting services, Core Security consulting services, auditing software, source code auditing, black-box auditing, VISA-CISP, software security audit, software security audit services, software security auditing, software security testing, network security architecture implementation, network security architecture review, network security review, Open Web Application Security Project, OWASP, CoreLabs, credit card infrastructure security, computer application protection, computer application security, data traffic inspection, database protection, database security, enforcement of information security

Site position: 227218 (in .com); 368347 (Global Alexa rank)

Visit date: 2012-12-14 00:11:04




FreeRADIUS: The world's most popular RADIUS Server

freeradius.org
(view complete information about freeradius.org)


The world's leading RADIUS provider. The project includes a GPL AAA server, a GUI, and a BSD licensed client. Full support is available

Keywords: RADIUS,AAA,GPL,SQL,LDAP,Active Directory,EAP

Site position: 15214 (in .org); 410452 (Global Alexa rank)

Visit date: 2012-11-25 19:15:59




cherrycorp.com screenshot

CHERRY Switches, Sensors, Keyboards and Automotive Modules

cherrycorp.com
(view complete information about cherrycorp.com)


CHERRY manufactures computer keyboards, snap-action and rocker switches, magnetic sensors, controls, and custom automotive switches.

Keywords: switches, switch, sensors, sensor, keyboards, keyboard, controls, automotive, modules, computer, POS, point-of-sale, USB, biometric, finger-print, smart card reader, magnetic stripe, input devices, mouse, mice, snap-action, rocker, keyswitches, thumbwheel, interlock, push button, push-button, miniature, subminiature, sub-miniature, sealed, lighted, magnetic, proximity, speed, direction, digital vane, seat belt assembly, cruise control, air bag sensor, door panel, window, lock, seat, design, manufacture, manufacturing

Site position: 282929 (in .com); 454367 (Global Alexa rank)

Visit date: 2012-12-12 13:34:00




VASCO Data Security - A World Leader in Strong Authentication - Homepage

vasco.com
(view complete information about vasco.com)


VASCO is the leading supplier of strong authentication and e-signature solutions and services specializing in Internet Security applications and transactions.

Keywords: VASCO, digipass token, Vasco Data Security, strong authentication, strong user authentication, token security, token authentication, authenticator, two-factor authentication, password token, DIGIPASS, Identikey, axguard, VACMAN, Secure, smart card readers, EMV readers, EMV-CAP, banking security, Pki readers, remote banking security,securid, HBCI, securecode, Verified by Visa, Phishing, authentication, 2fa, Cisco, Citrix, Sonicwall, Check Point, Fortinet, Imprivata, Novell

Site position: 308400 (in .com); 492414 (Global Alexa rank)

Visit date: 2012-12-03 01:06:22




RSA - The Security Division of EMC

rsasecurity.com
(view complete information about rsasecurity.com)


RSA - The Security Division of EMC

Site position: 321887 (in .com); 512613 (Global Alexa rank)

Visit date: 2013-02-19 04:33:36




Imprivata

imprivata.com
(view complete information about imprivata.com)


Imprivata helps organizations secure their networks and ensure emr adoption by offering single sign-on solutions for health information access.

Keywords: secure authentication, access management, strong authentication, identity management, enterprise single sign-on, two-factor authentication, healthcare single sign on, identity management, password management, single sign on security

Site position: 340441 (in .com); 539873 (Global Alexa rank)

Visit date: 2012-12-18 18:13:16




Face Detection Homepage: Face finding and recognition

facedetection.com
(view complete information about facedetection.com)


Face Detection Home Page. Links, papers, software and image database about detecting and recognizing human faces via image processing algorithms.

Keywords: face, detection, recognition, facial, finding, facedetection, analysis, localization, Gesichtserkennung, Gesichtsfindung, person, homepage, hp, biometric, identification, algorithm, Algorithmus, algorithms, image, processing, Bildverarbeitung, tracking, faces, eye, iris, recognise, human, color, free, locating, location, detect, security, surveillance, download, shareware, freeware, software, source, code, Robert, Frischholz

Site position: 354301 (in .com); 559935 (Global Alexa rank)

Visit date: 2012-12-20 23:21:23




Single Sign-On (SSO) and Identity & Access Management Solutions (IAM) for Web, Cloud, Mobile Applications & Devices | Symplified

symplified.com
(view complete information about symplified.com)


Symplified provides seamless single sign-on, identity and access management services to help businesses around the world safely and securely connect users to cloud, web and mobile applications.

Keywords: symplified, identity and access management, single sign-on, aim, sso, saml, cloud security, federated identity, identity management, mobile security, byod

Site position: 412942 (in .com); 643282 (Global Alexa rank)

Visit date: 2012-11-20 07:03:12




krollontrack.co.uk screenshot

Data Recovery, Computer Forensics & E-Disclosure - Kroll Ontrack UK

krollontrack.co.uk
(view complete information about krollontrack.co.uk)


Kroll Ontrack provides the leading data recovery, e-disclosure & computer forensics products and services for your data recovery & critical information needs.

Keywords: data recovery, computer forensics, electronic disclosure, digital evidence, forensic computing, computer investigations, edisclosure, e-disclosure, litigation support, data recovery solutions, data recovery software, recover data, legal technology

Site position: 11688 (in .uk); 703738 (Global Alexa rank)

Visit date: 2012-11-22 05:03:59




Evidian: IAM for business and people

evidian.com
(view complete information about evidian.com)


Support | Contact us Authentication management Enterprise single sign-on Web single sign-on Identity and access management Network and system monitoring High availability software For Microsoft Environment Industry Solutions Finance Healthcare...

Site position: 489889 (in .com); 750395 (Global Alexa rank)

Visit date: 2012-12-12 21:11:26




IT Security - The Industry's Web Resource

itsecurity.com
(view complete information about itsecurity.com)


The latest In-depth product reviews, buyer’s guides, product comparisons, news, market analysis, whitepapers, and other information on IT security.

Site position: 591432 (in .com); 883390 (Global Alexa rank)

Visit date: 2012-12-13 01:42:10




Information Security, Compliance, and Messaging Services For Your Organization | Perimeter E-Security

perimeterusa.com
(view complete information about perimeterusa.com)


Perimeter E-Security Is The Market Leader In Information Security. We Offer IT Security, Managed Service Provider, Compliance, & More. Protect Your Network Today!

Keywords: perimeter e-security, information security vendor, security services, compliance, messaging, usa.net, security as a software, cloud services, email, phishing prevention, vulnerability scanning, security consulting, tim harvey, andrew jaquith, richard dobrow, andy lazarus, john viega, kurt heinemann

Site position: 600143 (in .com); 894618 (Global Alexa rank)

Visit date: 2012-12-22 05:25:06




Managed Security Services | MSSP | Information Security Services

solutionary.com
(view complete information about solutionary.com)


Solutionary, the leading pure-play Managed Security Service Provider (MSSP), provides information security services to protect data, aid compliance and reduce costs by using the patented ActiveGuard service platform which acts as a SIEM in the cloud.

Keywords: Solutionary, MSSP, Managed Security Services Provider, Log Management, Log Monitoring, Information Security, Data Security, Cloud Security, Cloud, compliance, Leader in Magic Quadrant

Site position: 631148 (in .com); 933979 (Global Alexa rank)

Visit date: 2012-12-18 07:33:31




sensepost.com screenshot

SensePost - SensePost Information Security

sensepost.com
(view complete information about sensepost.com)


Social: Home About Solutions Clients Capabilities Accreditations Vacancies Black Economic Empowerment Services Security Assessment Internal Infrastructure External Infrastructure Wireless Remote Access Application Mobile Source Code Social Engineering...

Site position: 631775 (in .com); 934733 (Global Alexa rank)

Visit date: 2013-01-14 00:33:48




Computer Forensics, Computer Forensics Training, Forensic Training, Forensic Computers, Forensic Hardware, and Forensic Software Solutions for the Computer Forensics Community

digitalintelligence.com
(view complete information about digitalintelligence.com)


Computer Forensics Training, Forensic Computers, Forensic Training, Forensic Hardware, and Forensic Software Solutions for the Computer Forensics Community, Law Enforcement, Intelligence Agencies, and Corporate Security Professionals

Keywords: Computer Forensics Training, Forensic Computers, Forensic Hardware, Forensic Software, Forensic Training, Computer Forensics, FRED, FREDDIE, FRED Sr, DriveSpy, PDWipe, PDBlock, Image, Part, SCSIBlock, FIREBlock

Site position: 634763 (in .com); 938420 (Global Alexa rank)

Visit date: 2013-02-21 06:44:36




Paladion :: Home

paladion.net
(view complete information about paladion.net)


Paladion is a global full service managed security provider committed to delivering technology solutions to ensure impenetrable security to 400+ clients in 15 countries across Asia, US and Europe

Keywords: security consulting, security implementation, enterprise security, firewall, svpns, smart cards

Site position: 52444 (in .net); 943230 (Global Alexa rank)

Visit date: 2013-01-08 21:57:38




idteck.com screenshot

idteck.com

idteck.com
(view complete information about idteck.com)


Products Hardware Software Package Biometrics Standalone Controller Access Control Panel Proximity Reader / Card & Tag ASK[EM] iPASS Series Smart Card Reader Long Range Reader & Tag CCTV / DVR (HYBRID) Accessories Demo Kit Access Control Software Time &...

Visit date: 2012-11-22 02:08:25




biometrix.at screenshot

Fingerprint Zeiterfassung, Zutrittskontrolle, Zugangssystem und Türffner von Biometrix Int.

biometrix.at
(view complete information about biometrix.at)


Fingerprint Zeiterfassung und Zutrittskontrolle, Fingerabdruck Türffner und Zutrittsreader, alltagstauglich und netzwerkfhig, für Haus, Büro und Betrieb.

Keywords: Fingerprint, Fingerabdruck, Zutrittsreader, Zugangskontrolle, Fingerprint Zugangssystem, fingerscan, fingerprint reader, Tü,rö,ffner, Zeiterfassung, Zutrittskontrolle, Fingerprint Software, Desktop Reader, fingerprint software, SDK

Visit date: 2012-11-28 00:28:42




Defcon-5 - Virginia Computer Repair, Custom Computers, and Consulting Services

defcon-5.com
(view complete information about defcon-5.com)


Defcon 5 provides computer repair, consulting, and security services for business and residential clients in and around Fredericksburg Virginia.

Keywords: Virginia Computer Repair, Virginia Computer Security, Virginia Small Business Computer Security, Virginia PC Computer Repair, computer service, Fredericksburg VA, Defcon-5

Visit date: 2012-12-12 04:05:56




tracesecurity.com screenshot

TraceSecurity provides network security compliance solutions and services for IT security compliance, IT security risk assessments, risk management, IT audits, compliance training, social engineering, policy development, security awareness training, external penetration testing, internal penetration testing, vulnerability assessments ( including vulnerability scanning ), automated security compliance tools and more.

tracesecurity.com
(view complete information about tracesecurity.com)


TraceSecurity is a leading provider of solutions and services for IT security compliance, risk assessments and risk management, security assessments, IT audits, vulnerability assessments, penetration testing, compliance policy development, security awareness training and other facets of Governance, Risk and Compliance ( GRC ).

Keywords: tracecso,TraceCSO,tracesecurity,security compliance,penetration test,it audit,social engineering,risk assessment,vulnerability assessment,security assessment,policy management

Visit date: 2012-12-12 09:04:47




myonelogin.com

myonelogin.com
(view complete information about myonelogin.com)


[INROBOT CONNECTION ERROR - 408 Request Timeout while connecting]

Visit date: 2013-02-05 16:52:51





Liberty Alliance

projectliberty.org
(view complete information about projectliberty.org)


Projectliberty.org is now read only . This site is no longer being updated but remains as an archive of the work of the Liberty Alliance. All Liberty Alliance work and related materials have been contributed to the Kantara Initiative. Visit...

Visit date: 2012-12-15 04:35:58




imm.org.pl screenshot

Powitalna - Instytut Maszyn Matematycznych

imm.org.pl
(view complete information about imm.org.pl)


INSTYTUT BADANIA OFERTA PUBLIKACJE KONTAKT WYSZUKIWARKA AKTUALNOŚCI Aktualizacja: 29.12.2012 r. 29.12.2012 Po sprawdzeniu przebiegu i wyników ponad 200 specjalistycznych testów, organizatorzy II Narodowego Testu Interoperacyjności Podpisu...

Visit date: 2013-01-28 18:07:39




nsslabs.com screenshot

Welcome to NSS Labs | NSS Labs

nsslabs.com
(view complete information about nsslabs.com)


Leading information security research and advisory company. We deliver test-based research and expert analysis needed to make good security decisions.

Keywords: NSS, NSS Labs, security, research, analysis, network testing, host testing, product testing

Visit date: 2012-12-17 13:52:30




openiddirectory.com screenshot

The OpenID Directory

openiddirectory.com
(view complete information about openiddirectory.com)


Firefox OpenID plugin http://creastrategias.wikispaces.com/ Microsoft HealthVault Ifkes Social Network Jonathan Fuentes OpenID Holywars.ru / РинÑеÑнеÑе кÑо-Ñо не пÑав Syndicat M

Keywords: Firefox,OpenID,plugin,http://creastrategias.wikispaces.com/,Microsoft,HealthVaul t,Ifkes,Social,Network,Jonathan,Fuentes,OpenID,Holywars.ru,инÑеÑРеÑе,кÑо-Ñо,пÑав,Syndicat,Métallurgie,Provenc e,Côte,dâAzur,CFE-CGC,Métallurgie,Conseil,défense,EevissimaVipBlog,K ouwepolder,Weblog,Fabric,Structure,Community

Visit date: 2012-12-19 22:47:43




cryptocard.com screenshot

CRYPTOCARD :: experts in authentication

cryptocard.com
(view complete information about cryptocard.com)


CRYPTOCARD :: experts in authentication

Keywords: Crypto, CryptoCard, Crypto Card, Cryptomas, identity theft, network security, pci compliance, computer security, information security, aaas, single sign on, it security, identity management, secure login, security certificate, digital signatures, iss security, cloud computing security, web application security, windows authentication, cloud security, digipass, application security, software security, http authentication, access management, network security tools, identity and access management, safeword, token, tokens, security token, usb token, tokenless, iphone passwords, blackberry passwords, computer network security, web service security, authentication systems, authentication techniques, Managed Security, Password security, Authentication, Cloud Based Security, Hosted Security, Strong passwords, Managed Authentication, Security Service Providers, MSSP, Code of Connection, VPN Security, Remote Access Security, User Verification, Password validation, multi factor authentication, 2fa, 2 factor, 2factor, dual factor authenticationtwo factor authentication, 2 factor authentication, mas hosted, mas provider, mas onsite, mas tokens, mas tokenless, mashosted, masprovider, masonsite, mastokens, mastokenless, blackshield, blacksheild, blackshield server, blackshieldserver, blackshield serviceprovider, blackshield service provider, blackshield cloud, blackshieldcloud, blackshield:server, blackshield:cloud, blackshield:serviceprovider, blackshield tokens, blackshield tokenless, blackshield:tokens, blackshield:tokenless

Visit date: 2012-12-20 08:40:53




Next results



| dig.do - home | list world top sites | top sites by category | top sites by country | blog | stats | terms of use | contact |