Control system security

Results: 2384



#Item
191Architecture / English grammar / Shall and will / Submittals / Electrical conduit / Access control / Construction / Security / Electrical wiring

Lenel On-Guard: Security System Installation and Wiring Standards GENERAL TERMS The Contractor shall add all access control System LENEL controllers LNL 2220, LNL 1320, LNL 1100 Multi Technology readers, and associated e

Add to Reading List

Source URL: www.longwood.edu

Language: English - Date: 2011-09-28 17:13:21
192Technology / Trusted computing / Telemetry / Network architecture / Trusted Network Connect / IF-MAP / SCADA / Control system security / Trusted Computing Group / Computer security / Computer network security / Computing

ARCHITECT’S GUIDE: ICS SECURITY USING TNC TECHNOLOGY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2013-11-06 16:49:30
193Access control / Capability-based security / Kernel / Operating system / X Window System / Server / Unix / Software / System software / Computing

Analyzing Capsicum for Usability and Performance Benjamin Farley December 23, 2010 Abstract

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2010-12-23 01:59:20
194Computer network security / Wireless networking / GTK+ / Aircrack-ng / Wireshark / Scapy / Pcap / Transmission Control Protocol / Wired Equivalent Privacy / Software / Computing / System software

EECS 388 Intro to Computer Security October 10, 2014 Project 3: Network Security

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2014-12-24 15:06:41
195Active Directory / Roaming user profile / User Profiles / Environment variable / Windows XP / Features new to Windows XP / Microsoft Windows / System software / Computing

Best of both worlds. End profile corruption. Retain system security and stability. Maintain administrative control over your network environment. Lessen the time you spend on lengthy and frustrating support calls by

Add to Reading List

Source URL: www.prianto.ch

Language: English - Date: 2012-04-11 04:39:36
196Electronic engineering / Mobile telecommunications / Logical Link Control / SMS / Wireless modem / Subscriber identity module / Hayes command set / Mobile phone / Information security management system / Technology / Mobile technology / Modems

SMSFinder User Guide for SF100, SF400, SF800 models

Add to Reading List

Source URL: downloads.inlogic.dk

Language: English - Date: 2013-02-21 03:40:56
197Security / Aviation / Technology / Taiwan Taoyuan International Airport / Taiwan / Taipei / Secondary surveillance radar / Surveillance / Aeronautical Message Handling System / Air traffic control / Avionics / Automatic dependent surveillance-broadcast

project report countrywide ads-b installation for anws taiwan Project Report on a Quadrant Implementation on the Island of Taiwan

Add to Reading List

Source URL: www.comsoft.de

Language: English - Date: 2014-09-30 13:03:30
198System software / Computer architecture / Content-control software / Fortinet / Windows Server / Cryptographic protocols / Application firewall / Windows / IPsec / Computer network security / Computing / Tunneling protocols

FortiClientTM Endpoint Security Application FortiClient is an all-in-one comprehensive security solution that extends the power of FortiGate’s unified threat management to endpoints on your network. Desktops, laptops,

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:15:13
199Driving / Vehicular communication systems / Wireless networking / Intelligent transportation system / Infrastructure / Public transport / Telematics / Passenger information system / Computer security / Technology / Transport / Sustainable transport

Position Paper on Intelligent Transport Systems Introduction Intelligent Transport Systems (ITS) comprise several combinations of communication, computer and control technology developed and applied in the domain of tran

Add to Reading List

Source URL: nem-initiative.org

Language: English - Date: 2014-01-09 04:50:02
200FOAF / Role-based access control / Distributed Access Control System / Lattice-based access control / Password / Semantic Web / PERMIS / Authentication / Security / Access control / Computer security

R O L E A N D L O C AT I O N B A S E D A C C E S S C O N T R O L USING SEMANTIC WEB TECHNOLOGIES sandro cirulli student number: supervisor: professor david duce module: p00998 - msc dissertation

Add to Reading List

Source URL: sandrocirulli.net

Language: English - Date: 2015-05-17 14:55:32
UPDATE