Firewall

Results: 2502



#Item
631Computer architecture / Ethernet / OpenCloud / Network architecture / Carrier Ethernet / Virtual firewall / Overlay network / Computing / Centralized computing / Cloud computing

OpenCloud Connect Technical White Paper The Benefits and Challenges Ahead for Cloud Operators Executive Summary © OpenCloud ConnectAny reproduction of this document, or any portion thereof, shall contain the foll

Add to Reading List

Source URL: www.opencloudconnect.org

Language: English - Date: 2015-03-23 10:00:39
632Computer security / Deep packet inspection / System software / Security appliance / Content filtering / Firewall / Content-control software / Computer network security / Computing / Server appliance

ContentProtect Security Appliance The ContentProtect Security Appliance is a deep-packet, Layer 7 inspection appliance that scans, identifies, and controls Internet traffic—and provides advanced content filtering, rep

Add to Reading List

Source URL: www.contentwatch.com

Language: English - Date: 2011-07-13 15:00:12
633Windows Vista / Windows XP / Windows Firewall / Shared resource / Features new to Windows XP / Management features new to Windows Vista / Microsoft Windows / Computing / System software

Windows 8: Advanced Topics Days: 1 Prerequisites: Windows 8: Basic or equivalent experience Description: This ILT Series course teaches more advanced functions of Windows 8. Students will learn

Add to Reading List

Source URL: www.lantecctc.com

Language: English - Date: 2014-10-10 14:09:12
634Telecommunications engineering / Internet protocols / Inter-process communication / Adapter / Transmission Control Protocol / Computer network / Firewall / Traffic flow / Network packet / Computing / Network architecture / Data

Panda: Middleware to Provide the Benefits of Active Networks to Legacy Applications 1 Vincent Ferreria, Alexey Rudenko, Kevin Eustice, Richard Guy, V. Ramakrishna, and Peter Reiher UCLA

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2003-05-20 12:07:13
635Internet protocols / Computer network security / Network performance / WS-Security / SOAP / Proxy server / XML-RPC / Firewall / XML / Computing / Remote procedure call / Cryptography standards

A Signing Proxy for Web Services Security Ingo Melzer DaimlerChrysler AG Mario Jeckle

Add to Reading List

Source URL: www.ingo-melzer.de

Language: English - Date: 2005-06-13 05:20:47
636Internet protocols / Internet standards / Multihoming / Stream Control Transmission Protocol / Streaming / Computer network security / Transport layer / Transmission Control Protocol / Firewall / Network architecture / Internet / Computing

Basic Protocols 25 Figure 2.3: These are phase diagrams of the sequence number generators for four operating systems. The lower right shows a correct implementation of RFC 1948 sequence number generation (by FreeBSD 4.6

Add to Reading List

Source URL: www.wilyhacker.com

Language: English - Date: 2004-11-16 15:11:46
637Architecture / Fire sprinkler system / Fire door / Firewall / Fire-resistance rating / Occupancy / Lumber / Timber framing / Framing / Fire protection / Passive fire protection / Safety

MULTI-RESIDENTIAL TIMBER FRAMED CONSTRUCTION Class 2 & 3 Buildings DESIGN & CONSTRUCTION MANUAL

Add to Reading List

Source URL: www.watimberframing.net.au

Language: English
638Computer security / Computing / Denial-of-service attack / Internet Relay Chat / Data security / UDP flood attack / SYN flood / Firewall / Traffic generation model / Denial-of-service attacks / Computer network security / Cyberwarfare

DDoS Benchmarks and Experimenter’s Workbench for the DETER Testbed Jelena Mirkovic Songjie Wei University of Delaware

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2007-08-23 18:34:40
639Computer architecture / Network performance / Crypto-anarchism / Internet privacy / Virtual private network / Cloud computing / Traffic shaping / Firewall / Multiprotocol Label Switching / Computing / Network architecture / Computer network security

SMART WAN The private cloud company Next generation MPLS networks offer flexibility, strong

Add to Reading List

Source URL: www.link-connect.com

Language: English - Date: 2014-08-12 05:26:32
640Internet privacy / Network architecture / Cyberwarfare / Computer networking / Network performance / Proxy server / Great Firewall of China / SOCKS / Deep packet inspection / Computing / Computer network security / Internet

1 Systemization of Pluggable Transports for Censorship Resistance arXiv:1412.7448v1 [cs.CR] 23 Dec 2014

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2014-12-23 20:35:03
UPDATE