More about Security (158)

by lux36

| Looking for a good book to get you through Christmas? How about the “Handbook on DIY Electronic Security and Espionage”? Learn all the trick...

€5 (FREE for Members)

| In the previous article in our series of projects on DIY highly secure communications [1], it was shown how to build a secure tamper-evident...

by lux36

| If you are interested in espionage and security, you may like to participate in our Spy Contest! Analyze my book, find (better) answers/solu...

| [Partner Content] TimeKeeper enables organizations to reliably manage and monitor time-critical applications, devices and infrastructure.

| [Partner Content] Keysight has delivered a new IoT Security Assessment software solution that enables IoT chip and device manufacturers, as...

| [Partner Content] The new platform enables manufacturers and operators to ensure network equipment supports massive data volumes and cyberse...

| Data storage and security are essential. Silvio Muschter, CEO at Swissbit AG, talks about the company's background, its twentieth anniversar...

| When a Raspberry Pi controls a sensitive process or a machine that may only be started by authorised people, it may be useful to protect it...

| This is a submission from Apacer. They will participate in embedded world 2021and display a variety of cutting-edge products for defense app...

| The beauty of an SD card is that it gives you simple access to data. You can copy or alter a card's content on laptops, PCs, or even microco...