Asymmetric Warfare for Entrepr
Asymmetric Warfare for Entrepreneurs is a deconstruction and adaptation of TE Lawrence's epic account of the Arab Revolt. The conflict was a side theatre of World War I which pitted the British Imperial might against Ottoman dominance in the Middle East.
- Audio & Multimedia
- Business
- Communications
- Desktop
- Development
- Education
- Games
- Graphics
- Home & Hobby
- Network & Internet
- Screen Savers
- Security & Privacy
- Servers
- System Utilities
- Web Development
- Softaken ZIP Recovery
- Disk Repair Utilities
- Recover USB Data Mac
- Undelete Digital Camera Photo
- Zune Files Salvage Tool
- Classroom Spy Professional
- CSV Editor Pro
- imyPass iPhone Password...
- Aiseesoft Mac Data Recovery
- AnyMP4 MP4 Converter for Mac
- Atlantis Word Processor Lite
- Quick Receipt Software for Mac
- Memory Card Data Recovery
- Allavsoft
- Files Undelete Software
- ADRC Data Recovery Tools
- avast! Antivirus
- Revo Uninstaller
- Java Runtime Environment
- AVG Anti-Virus Free Edition
- GOM Media Player
- RegSeeker
- IrfanView
- CPU-Z
- Malwarebytes Anti-Malware
- Spybot Search & Destroy
- Skype
- µTorrent
- Ai File Extension Editor
- Remove Drm From Pdf Files
- Download Word Templates For...
- Assault Cube Sounds
- Download Song As Zip File
- Rankquest Watchseo
- Free Becker Cpa
- Creative Smiley Faces Text
- Portable Photo Editor Free...
- Screen Capture Master
- Bat Merge
- Daz Iso Compressor
- Destroy Recycle Bin Windows
- Decode Firefox Cache File
- Link Directory Script
Asymmetric Download
-
1$13.99
-
2CommuniCrypt Mail 1.16
E-mail client with strongest asymmetric Public-Key-Encryption(RSAES-OAEP). This client is fully featured for receiving/sending mails via POP3/SMTP. With the integrated SMTP engine you do not need a SMTP server, program is trying to send the mail directly ...Freeware -
3SIDS 2.0
SlimFlor Integrated Design Software – ‘SIDS’ – designs and analyses flooring solutions utilising both SlimFlor Fabricated Beams (SFB) and Asymmetric SlimFlor Beams. Main features: - resentation of design schemes ... -
4SeriousBit Ellipter 1.2
NET library for licensing shareware applications and components based on Elliptic Curves Asymmetric Cryptography. Using a new and strong security technology we provide software developers and publishers with an unprecedented level of protection. With ...$99.95 -
5CryptoBlackbox for Java 11.0
CryptoBlackbox includes hashing and HMAC, symmetric encryption, asymmetric (PKI-based) encryption and digital signing, timestamping and X.509 certificate management, key derivation functions. CryptoBlackbox for Java and Android works on Java 1.5 and ...Freeware -
6CryptoBlackbox .NET 11.0
CryptoBlackbox includes hashing and HMAC, symmetric encryption, asymmetric (PKI-based) encryption and digital signing, timestamping and X.509 certificate management, key derivation functions. CryptoBlackbox .NET works with .NET 2.0, 4.0, 4.5, WinRT ...Freeware -
7BigSpeed Video Chat SDK 3.0
The security is provided in two different modes: symmetric encryption with shared secret key and asymmetric encryption with 1024-bit public/private keys.Freeware -
8CyberGuard 1.0
It allows you to encrypt files using asymmetric encryption, shred files to make them unrecoverable, clean internet and computer usage tracks, add secret messages to images and store files with sensitive content in an encrypted and password protected ...$49.95 -
9HighVIP Protected Email 3.4
Formally comply with privacy and security provisions of: HIPAA, GLBA, SEC 17a-4; NASD 3010 2048 to 4096 bit Asymmetric and 256 bit Symmetric Key Encryption, Automatic Key and Contact Management. Your data and your information stored in our Secure Data ...$29.00
Buy -
10Advanced Pathway Painter 2.24
This freeware program visualizes pathways (KEGG, BioCarta, GenMAPP). The user has the possibility to display any kind of quantitative data from gene and protein experiments directly within the pathways (colors represent the value). The linking between ...Freeware -
11BCArchive 1.08.8
BCArchive uses strong encryption symmetric and asymmetric algorithms.Freeware -
12BIGSPEED Peer-to-Peer SDK 3.0
The security is provided in two different modes: symmetric encryption with shared secret key and asymmetric encryption with 1024-bit public/private keys.Freeware -
13Video Conferencing Server TrueConf
In the asymmetric video conference, or broadcast, all participants can view only the main broadcaster while the main broadcaster can see everyone connected. TrueConf Server is far easier to deploy than many other solutions, so, no need to spend your ...$3,295.00
Buy -
14Chalmlite 4.0
Chalmit has been offering a lighting design software program to the lighting industry for nearly 15 years. The recently released version v4.05 has a dual language feature in English and Russian and adds even greater usability to the already feature rich ...Freeware -
15AccuracyRatio 1.6
AccuracyRatio accommodates two-sided, single-sided, symmetric and asymmetric tolerance limits and features a full reporting capability. AccuracyRatio is based on methods reported in NASA Reference Publication 1342, U.S. Navy R&D reports on the ...$795.00 -
16proXSign 2.0
It is specifically convenient for business, governmental, financial and other solutions and provides a complete set of functions for: * digital signing and verification of digital signatures, * asymmetric encryption and decryption (based on x.509 ...$350.00 -
17Ortep3 for Windows 1.0
- Up to 999 atoms may be present in the asymmetric unit. Covalent radii for the first 94 elements are stored internally, and may be modified by the user. - Several style-templates are supplied, but the graphical representations of thermal ellipsoids ... -
18OptimumK 1.1
Flexibility by allowing users: -to choose any input and output coordinate systems, -select symmetric or asymmetric suspension point input, -have the option to roll and pitch chasses around a moving, fixed or custom-designed rotation axis, and -specify ...$2,017.05 -
19CommuniCrypt QuickHasher 1.1
With CommuniCrypt QuickHasher you can create a Hash of a file or verify the authenticity of a file with an existing hash value. QuickHasher uses the modern SHA-2 Hash with 256 bit. The outdated MD5 is not supported. Your Solution For High Secured ... -
20Proxy Workbench 1.2
Major Features - See data flow between socket connections - Animated socket connection diagram - 'Pass Through' protocol handler for debugging protocols - Connection failure simulation strategies allow you to simulate: a) Slow or asymmetric Internet connections ...$200.00 -
21CRYPTO CHAT 4 SKYPE 2.0.0.2
Skype Extra type: Application - Features: Crypto Chat for Skype with Asymmetric Cryptography (RSA 1024 bits) Requirements: Windows (TM) 2000 / XP SP3 / Vista / Win7 (x86-x64) - Framework 4.0 - 512 Mb Ram - 20 Mb HD - Skype (TM) 3.XFreeware -
22F30 Advanced Encryption 2013
Symmetric and asymmetric algorithms (17 data destruction algorithms). Secure file deletion. Using USB flash drives to store [en]-decryption keys. Creating encrypted self-extracting file to send it as email attachement. No additional software is required ...Freeware -
23HighVIP Protected Email Linux 3.5.1
Formally comply with privacy and security provisions of: HIPAA, GLBA, SEC 17a-4; NASD 3010 2048 to 4096 bit Asymmetric and 256 bit Symmetric Key Encryption, Automatic Key and Contact Management. Your data and your information stored in our Secure Data ...Freeware -
24xSQL Documenter 4.5.0
All objects supported - database properties, server properties and configuration, tables, views, stored procedures, user defined functions, user defined types, triggers, indexes, primary/foreign key relationships, constraints, schemas, assemblies, symmetric and asymmetric keys, certificates, ...$199.00 -
25Voxengo VariSaturator 1.10
The valve saturation module applies asymmetric valve processing that closely resembles sound of a high-quality valve amplifier cascade. Another saturation module VariSaturator features is a digital "waveshaping" saturator with feedback topology.$49.95