Daemon

Results: 420



#Item
331Cross-platform software / Convertibles / Coupes / Hatchbacks / Firebird / Firefox / Tux / Daemon / Su / Software / System software / System administration

Firebird Superserver Manager Norman Dunbar 13 October 2011 – Document version 1.6 Table of Contents Introduction. .......................................................................................................

Add to Reading List

Source URL: www.firebirdsql.org

Language: English - Date: 2011-10-13 09:45:40
332PKCS11 / PKCS / Hardware security module / OpenSSL / X.509 / RSA / Security token / Transmission Control Protocol / Cryptography / Public-key cryptography / Cryptography standards

LSM-PKCS#11 Lite Security Module A daemon to handle Secure Boxes (cryptographic keys, X509 certificates and data objects), accessible through a PKCS#11 library, supporting non-certified (lite) Hardware or Software Securi

Add to Reading List

Source URL: www.clizio.com

Language: English - Date: 2010-09-18 05:21:08
333Concurrent computing / Middleware / Inter-process communication / Internet protocols / Advanced Message Queuing Protocol / Apache Qpid / Daemon / Message-oriented middleware / Computing / System software

AMQP Messaging Broker (Implemented in C++) AMQP Messaging Broker (Implemented in C++) Table of Contents

Add to Reading List

Source URL: qpid.apache.org

Language: English - Date: 2014-06-03 09:50:10
334Kppp / Point-to-Point Protocol daemon / Modems / Dial-up Internet access / Hayes command set / Dialer / Callback / Software / System software / Internet

PDF Document

Add to Reading List

Source URL: docs.kde.org

Language: English - Date: 2014-08-21 04:43:56
335Network file systems / System software / Inter-process communication / Server Message Block / Microsoft Open Specification Promise / Internet Printing Protocol / Line Printer Daemon protocol / Active Directory / Shared resource / Computing / Network protocols / Computer printing

PDF Document

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2013-07-23 18:39:40
336Computing / Internet / Computer networking / Bird Internet routing daemon / Interior gateway protocol / Network architecture / Routing protocols / Routing

SR-BATS[removed]Exhibit 5 Page 16 of 17

Add to Reading List

Source URL: www.sec.gov

Language: English - Date: 2010-10-22 14:39:46
337Computer network security / Attack surface / Vulnerability / Exploit / Daemon / Computer security / Security / Cyberwarfare

Measuring the Attack Surfaces of Two FTP Daemons Pratyusa Manadhata, Jeannette Wing Mark Flynn, Miles McQueen Carnegie Mellon University

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2006-12-07 12:33:29
338Music Player Daemon / Emergency management / Media technology / Application software / Software / Crisis communication

Montana Promotion Division Crisis Communication Action Plan Purpose: The purpose of the Montana Promotion Division (MPD) Crisis Communication Action Plan is to provide effective and constructive communication with the tr

Add to Reading List

Source URL: www.travelmontana.org

Language: English - Date: 2007-11-28 14:34:26
339Computing / Security / Sociology / EigenTrust / Peer-to-peer computing / Daemon / Trust / Reputation system / Computer security / Reputation management / Social psychology / Ethics

DTT: A Distributed Trust Toolkit for Pervasive Systems Brent Lagesse,∗ Mohan Kumar,∗ Justin Mazzola Paluska,† and Matthew Wright∗ ∗ Department of Computer Science Engineering, University of Texas at Arlington,

Add to Reading List

Source URL: www.csiir.ornl.gov

Language: English - Date: 2009-04-19 14:46:26
340Spamming / Malware / Computer network security / Multi-agent systems / Linux / Botnet / Backdoor / Email spam / Daemon / Computing / System software / Software

ESET_Logo_HorizontalClaim-White.eps

Add to Reading List

Source URL: www.welivesecurity.com

Language: English - Date: 2014-08-13 15:34:44
UPDATE