and Security Technologies

Results: 1110



#Item
401Internet / Prolexic Technologies / Akamai Technologies / Denial-of-service attack / Network architecture / Denial-of-service attacks / Computer network security / Computing

Akamai WEB Security Solutions: product brief Prolexic Connect As businesses and other organizations move increasingly online, the frequency, scale, and sophistication of denial-of-service (DoS) and distributed denial-of

Add to Reading List

Source URL: www.prolexic.com

Language: English - Date: 2014-07-23 15:12:36
402Information technology management / Corporate Governance of ICT / Computing / Information Technology Infrastructure Library / Government Enterprise Architecture / Information and communication technologies in education / Information and communications technology / Ministry of Communications and Information Technology / Bevil Wooding / Technology / Communication / Information technology

Information and Communication Technology Strategic Plan 2007–2011 Queensland Corrective Services Information and Communication Correctional security infrastructure withPlan

Add to Reading List

Source URL: www.correctiveservices.qld.gov.au

Language: English - Date: 2008-11-04 22:44:25
403Firewall / Grid computing / Port / Security / Stateful firewall / Application firewall / Computer network security / Computing / Cyberwarfare

4-3 Grid Communication Library Allowing for Dynamic Firewall Control HASEGAWA Ichiro, BABA Ken-ichi, and SHIMOJO Shinji Current Grid technologies tend not to consider firewall system properly, and as a result cause the d

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 19:05:09
404HTML5 / Web application / HTTP cookie / HTML / Internet privacy / Adobe Flash / HTML5 in mobile devices / Google Chrome / Software / Computing / Markup languages

HTML5 and security on the new web By James Lyne, Director of Technology Strategy There are lots of changes happening to the key technologies that power the web. The new version of HTML, the dominant web language, offers

Add to Reading List

Source URL: www.sophos.com

Language: English - Date: 2012-01-17 09:37:57
405Electronic signature / Cryptographic hash function / Hysteresis / Elliptic Curve DSA / Signature / SHA-1 / Message authentication code / RSA / ElGamal signature scheme / Cryptography / Public-key cryptography / Digital signature

3-11 Hysteresis Signature and Its Related Technologies to Maintain the Digital Evidence for Network Activities in Future Society TOYOSHIMA Hisashi and MIYAZAKI Kunihiko Security Requirements are varied with rapid growth

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:59:46
406Help desk / Information technology management / Reliability engineering / Technology / Systems engineering / Business / Customer experience management / Automation / Customer support

"It was important for ASG Security to partner with a software company that shares our values and long-term strategy for success. It did not take long to see that Bold Technologies stands out from among its peers as just

Add to Reading List

Source URL: www.boldgroup.com

Language: English - Date: 2014-06-24 15:16:44
407Infrared imaging / Image sensors / Surveillance / Terahertz radiation / Thermographic camera / Infrared / Microbolometer / Terahertz nondestructive evaluation / Staring array / Electromagnetic radiation / Radiation / Electromagnetic spectrum

8 Sponsored Research 8-1 Development of Remote Imaging Technologies at Terahertz Frequency ODA Naoki and KOMIYAMA Susumu Terahertz (THz) radiation, 1-10 THz, has shown promise for security imaging application. For this a

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 20:22:02
408Internet privacy / Network architecture / Akamai Technologies / Content delivery network / Virtual private network / Array Networks / SSL-Explorer: Community Edition / Computing / Computer network security / Internet

Akamai Application PErformance Focus Sheet Akamai IP Application Accelerator for Applications Delivered Over SSL VPN Enterprises need to ensure their employees, suppliers, customers and partners have real-time access to

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2012-03-20 07:12:27
409ZFS / Server / San Diego Supercomputer Center / NetApp filer / Comparison of platform virtual machines / Computing / System software / FreeBSD

Supporting Research and Development of Security Technologies through Network and Security Data Collection Cooperative Agreement FA8750[removed], CAIDA, UCSD HOSTING INFRASTRUCTURE DESCRIPTION The following describes th

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-02-02 18:52:30
410Computer network security / Prolexic Technologies / Akamai Technologies / Denial-of-service attack / Network architecture / Computing / Denial-of-service attacks / Internet

Akamai Web SECURITY Solutions: Product Brief Prolexic Proxy As businesses and other organizations move increasingly online, the frequency, scale, and sophistication of denial-of-service (DoS) and distributed denial-of-s

Add to Reading List

Source URL: www.prolexic.com

Language: English - Date: 2014-07-23 15:12:36
UPDATE