Searched for: "encryption methods for protecting data"
- Security (126)
- Networking (30)
- Cloud (21)
- Microsoft (15)
- Mobility (15)
- Data Management (10)
- Big Data (8)
- Developer (8)
- Hardware (6)
- Software (6)
- Storage (5)
- Apple (4)
- Banking (4)
- Cxo (4)
- Data Centers (4)
- Collaboration (3)
- Enterprise Software (3)
- Open Source (3)
- Project Management (2)
- Android (1)
- Google (1)
- Smbs (1)
- Social Enterprise (1)
- Virtualization (1)
About 282 results for "encryption methods for protecting data"
DataGravity leverages storage arrays for data loss prevention. Keith Townsend points out that tech is just one aspect of a data center security solution.
If you've been looking for the easiest way to encrypt your mobile email, Jack Wallen has the solution with K-9 Mail and AGP.
In present years, there has been momentous progress in multimedia technologies. Transmission of multimedia data such as audio, video and pictures above the Internet is now-a-days e...
In recent years, due to explosive growth in the use of internet the security of sensitive data becomes one of the prime concerns. For this various data hiding techniques are in use...
Researchers at Georgia Tech find FPGA chips used to control IoT devices are ripe for security compromises. They have a solution and challenge you to try to hack it.
With the development of cloud computing, the interest on spatial database outsourcing has been sharply increasing. Therefore, researches on data encryption methods for protecting l...
A safeguarded fact transmitting is usually a critical matter pertaining to Wireless Sensor Networks (WSNs). Clustering is an effective in addition to realistic method to improve th...
A Tool for Protecting Electronic Data in Centralized database using Improved Advance Encryption Standard (AES) and Secure Hash Algorithm (SHA)
In recent years, there is a wide amount of data available; which can be any one's personal data or any organization's important data. The main problem is to hide sensitive informat...
Now-a-days, security is one of the major problem facing all over the world. To protect the user's secret information from the strangers it is necessary to convert the information i...
WSNs are widely used in various medical, military, weather or several other applications. The trend of Wireless Sensor Networks (WSNs) is rising every year and they are being expos...