Hardware security

Results: 1760



#Item
471Computer security / Parallel computing / Network processor / Intrusion prevention system / Communications protocol / Network switch / Denial-of-service attack / Transmission Control Protocol / Snort / Computer network security / Computing / Cyberwarfare

Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson,1 K. Asanovi´c,2 S. Dharmapurikar,3 J. Lockwood,4 R. Pang,5 R. Sommer,1 N. Weaver1 Abstract The performance pressures on implementing e

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2006-07-08 02:12:10
472Windows NT / Windows XP / Windows Server / Windows Server 2008 R2 / Windows Vista / Microsoft Security Essentials / Windows 8 / Windows / 64-bit / Microsoft Windows / Software / Computer architecture

Hardware and Software Requirements for DATAIR Windows Application Software Operating Systems Workstation Operating Systems (32-bit x86 & 64-bit x64 unless otherwise noted)  

Add to Reading List

Source URL: www.datair.com

Language: English - Date: 2013-10-23 01:00:43
473Transmission Control Protocol / Packet Processing / Intrusion prevention system / Packet loss / Network switch / CPU cache / Snort / Network processor / Packet capture / Computer network security / Computing / Firewall

Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention Jose M Gonzalez Vern Paxson

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2007-09-08 20:27:32
474Cryptographic protocols / Networking hardware / Wireless security / Technology / Electronics / Network security / Wireless router / Home network / Router / Wi-Fi / Computing / Computer network security

Wireless Home Networking Quick Reference Guide Wireless Home Networking Wireless Home Networking service lets you connect multiple PCs, laptops, gaming consoles, tablets and other wireless devices throughout your home

Add to Reading List

Source URL: mm.mygrande.com

Language: English - Date: 2012-07-04 06:58:59
475Computer network security / Network management / Networking hardware / Computer networking / Teletraffic / Netflow / Ntop / RMON / Transmission Control Protocol / Software / Computing / System software

Realtime High-Speed Network Traffic Monitoring Using ntopng Luca Deri *†, Maurizio Martinelli*, Alfredo Cardigliano† IIT/CNR* ntop† Pisa, Italy

Add to Reading List

Source URL: luca.ntop.org

Language: English - Date: 2015-01-21 03:43:32
476Networking hardware / Computer hardware / Electronic engineering / Electric power / Power over Ethernet / Network switch / IP camera / Computer network / Cisco Systems / Ethernet / Video / Computing

What IP Video Security Systems Need - MN011315 - 2

Add to Reading List

Source URL: www.ismrep.com

Language: English - Date: 2015-01-13 17:25:00
477Special purpose file systems / Public-key cryptography / Filesystem-level encryption / Encryption / Data security / Database security / Vormetric / Disk encryption hardware / Cryptography / Disk encryption / Cryptographic software

Understanding and Selecting a Database Encryption or Tokenization Solution Securosis, L.L.C.

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2011-12-01 09:44:12
478Fingerprints / Computer security / Identity management / MIFARE / Card reader / HID Global / Universal Serial Bus / Security / Computer hardware / Access control

Microsoft Word - templat.doc

Add to Reading List

Source URL: www.eyenetwatch.com

Language: English - Date: 2010-05-17 10:43:27
479HOTP / Cryptographic protocols / Hardware security module / PKCS / SecurID / Key Management Interoperability Protocol / One-time password / X Window System / PKCS11 / Cryptography / Internet protocols / Cryptography standards

Key Management SDKs Complete vendor-independent key management solution 01010101100100101101001101110010101011010101010 KEY MANAGEMENT

Add to Reading List

Source URL: www.cryptsoft.com

Language: English - Date: 2015-04-27 12:14:08
480Technology / Tokenization / SecureWare Inc. / Computing / Computer hardware / Hewlett-Packard

H-P to Buy Security Technology Provider Voltage Security Feb. 10, 2015 By Josh Beckerman Hewlett-Packard Co. agreed to buy Voltage Security in a deal aimed at enhancing the company’s security

Add to Reading List

Source URL: www.morgenthaler.com

Language: English - Date: 2015-02-12 14:40:55
UPDATE