لوحة المعلومات

البحث في المحتوى

تحسين النتائج
Related Content

علامات الترميز النشطة

  • 194 النتائج
  • العناصر في كل صفحة

Biometric Vulnerabilities Exposed | Infographic

Explore this infographic from ABI Research which shows biometric vulnerabilities in data acquisition, data processing, and database communication.

مراجعة | تنزيل

Empowering Endpoint Security | Intel® Authenticate

White Paper: Describes benefits of Intel® Authenticate, endpoint security in a processor-based multifactor authentication and biometrics solution.

مراجعة | تنزيل

Enterprise Security Solutions with Intel® Authenticate Technology

Intel® Authenticate Technology operates at a hardware level to offer the most secure multi-factor identity access management tool for enterprises.

تقنية حماية الهوية Intel®‎

تعمل تقنية حماية الهوية Intel®‎ على منع الوصول غير المصرح به إلى حساباتك المهمة عن طريق تحسين مستوى الأمان.

Advanced Analytics for Real-Time Decisions

Learn how the Intel® Xeon® processor E7 v4 family can help get you on the path to advanced analytics for real-time decisions.

Security Software for Intel® QuickAssist Technology: Guide

Guide: Instructions for the Intel® EP80579 Software for Security Applications on Intel® QuickAssist Technology release package. (v.3, Sept. 2009)

مراجعة | تنزيل

Securing Intelligent Systems from the Ground Up: Brief

Technology Brief: Describes the state of security technology and how to transform the Internet of Things into a secure intelligent system.

مراجعة | تنزيل

Intel® EP80579 Software for Security on Linux*: Guide

Getting Started Guide: Obtain, build, install, and execute the Intel® EP80579 software for security applications on Linux*. (v.003, Sept. 2009)

مراجعة | تنزيل

Intel® Xeon® Processor E5-4600 v4 Product Family

Read the product brief to discover the benefits of four-socket servers based on the Intel® Xeon® processor E5-4600 v4 product family.

مراجعة | تنزيل

Powered by Intel® Cloud Technology

Discusses how the Powered by Intel® Cloud Technology program works to improve public cloud usage and trust by showing what is in cloud servers.