Security Related Algorithms


Pages: 1 2  All Results  Freeware

"Security Related Algorithms" in Software Title

1. BitDefender Total Security 2012 BETA... Benefit the latest technologies in the BETA of 2012 Total Security from BitDefender: AUTOPILOT provides a hassle-free experience by making optimal security-related decisions without input from you. This means no pop-ups, no alerts, nothing to... DetailsDownload 

Tags: antivirus , antispyware , security , scanner , spyware , virus

   


2. Digesec Hashing Utility 2.0.2 Digesec Hashing Utility is a free and easy to use hashing utility which produces the user selected digest (checksum) of any file or text, which can then be used to confirm the file's authenticity, hash passwords, or many other security related... DetailsDownload 

Tags: hash , checksum , digest , digesec , utility

3. Information Security Policy 1.3 An effective Information Security Policy gives clear direction on information security related matters, and be supported by visible Senior Management commitment. It should be readily accessible, easy to understand and appropriate to the... DetailsDownload - Screenshot

4. Security Q & A 1.0 The Security Q&A, iPhone and iPod Touch app is aimed at those who are sitting any security related test and in particular the Security industry Authority (SIA) exams. Since the app's release users have found many uses for it, from a colourful... DetailsDownload - Screenshot

5. Spicy Pass 1 SPICY PASS allows you to safely and securely store and organize your passwords, usernames, and security-related notes. It works for both Internet sites and local applications, and stores the login information in an encrypted database. SPICY PASS... DetailsDownload 

Tags: spicy pass allows , security related notes , both internet sites , spicy pass , security related , securely store , related notes , passwords usernames , pass allows , login information , local applications


"Security Related Algorithms" in Software Keywords

1. Spicy Pass 1 SPICY PASS allows you to safely and securely store and organize your passwords, usernames, and security-related notes. It works for both Internet sites and local applications, and stores the login information in an encrypted database. SPICY PASS... DetailsDownload 

Tags: spicy pass allows , security related notes , both internet sites , spicy pass , security related , securely store , related notes , passwords usernames , pass allows , login information , local applications

2. Winobj 2.22 WinObj is a must-have application if you are a system administrator concerned about security, a developer tracking down object-related problems, or just curious about the Object Manager namespace. WinObj is a 32-bit Windows NT program that uses... DetailsDownload - Screenshot

Tags: object-related problems , admin security , Object Manager namespace , object , manager , namespace

3. Lexicographic Order Algorithms 1.0 Algorithms, software, source code calculate lexicographic order of combinations; compiled program and source code are included. The source code uses two algorithms to find the index or rank for a combination; or find combination for given rank.... DetailsDownload - Screenshot

Tags: Lexicographical Order , Lexicographic , combinatorics , formula , formulas , algorithms , mathematics , software , program , source code , Basic Language

4. AKVIS Magnifier 1.0 Enlarge images to high resolution with sophisticated algorithms. AKVIS Magnifier upscales digital images with advanced enlargement algorithms, preserving edge to edge image sharpness while improving image appearance by removing unwanted noise and... DetailsDownload - Screenshot

Tags: super high resolution , poster size prints , akvis magnifier , poster size , high resolution , super high , sophisticated algorithms , smooth sharp , size prints , clearly defined , magnifier

5. Xceed Encryption Library 1.1 Xceed Encryption Library is an ActiveX component that allows Windows applications to encrypt and decrypt data using the latest industry standard strong encryption algorithms. It supports traditional secret-key encryption as well as public-key... DetailsDownload 

Tags: secret key encryption , public key encryption , key encryption , xceed components , strong encryption , secret key , public key , hashing algorithms , encryption algorithms , encryption algorithm , decrypt memory


"Security Related Algorithms" in Software Short Description

1. Security Q & A 1.0 The Security Q&A, iPhone and iPod Touch app is aimed at those who are sitting any security related test and in particular the Security industry Authority (SIA) exams. Since the app's release users have found many uses for it, from a colourful... DetailsDownload - Screenshot

2. Information Security Policy 1.3 An effective Information Security Policy gives clear direction on information security related matters, and be supported by visible Senior Management commitment. It should be readily accessible, easy to understand and appropriate to the... DetailsDownload - Screenshot

3. C++ Airline Travel Market Simulator... That project aims at studying and comparing typical airline IT methods, for instance RM-related algorithms. It works from a Unix/Linux/Mac command-line, and exposes basic APIs. It is being developed in C++, with Python wrappers for some components. DetailsDownload 

4. C++ Geometry Library 1.0 A C++ library for geometry and related algorithms DetailsDownload 

5. ASGPU 1.0 A short implementation of SVM related algorithms running on GPU DetailsDownload 


"Security Related Algorithms" in Software Long Description

1. Digesec Hashing Utility 2.0.2 Digesec Hashing Utility is a free and easy to use hashing utility which produces the user selected digest (checksum) of any file or text, which can then be used to confirm the file's authenticity, hash passwords, or many other security related... DetailsDownload 

Tags: hash , checksum , digest , digesec , utility

2. Security Q & A 1.0 The Security Q&A, iPhone and iPod Touch app is aimed at those who are sitting any security related test and in particular the Security industry Authority (SIA) exams. Since the app's release users have found many uses for it, from a colourful... DetailsDownload - Screenshot

3. Information Security Policy 1.3 An effective Information Security Policy gives clear direction on information security related matters, and be supported by visible Senior Management commitment. It should be readily accessible, easy to understand and appropriate to the... DetailsDownload - Screenshot

4. Spicy Pass 1 SPICY PASS allows you to safely and securely store and organize your passwords, usernames, and security-related notes. It works for both Internet sites and local applications, and stores the login information in an encrypted database. SPICY PASS... DetailsDownload 

Tags: spicy pass allows , security related notes , both internet sites , spicy pass , security related , securely store , related notes , passwords usernames , pass allows , login information , local applications

5. C++ Airline Travel Market Simulator... That project aims at studying and comparing typical airline IT methods, for instance RM-related algorithms. It works from a Unix/Linux/Mac command-line, and exposes basic APIs. It is being developed in C++, with Python wrappers for some components. DetailsDownload 

Pages: 1 2  All Results  Freeware

Top Software

New Software

Top Search

Latest Reviews