Infrastructure security

Results: 6100



#Item
441

Personnel Security Infrastructure HPOL#03 Ver1.0

Add to Reading List

Source URL: www.cert.gov.lk

Language: English - Date: 2014-05-12 00:35:29
    442

    Architecture & Security Overview The following document is intended to provide the reader with an overview of Conxport’s infrastructure, application architecture and Conxeo’s organizational philosophy regarding secur

    Add to Reading List

    Source URL: www.conxport.com

    Language: English - Date: 2013-05-28 17:09:26
      443

      INSPIRE: INcreasing Security and Protection through Infrastructure REsilience

      Add to Reading List

      Source URL: www.ict-forward.eu

      Language: English - Date: 2009-05-28 04:23:36
        444Cryptography / Key management / Public-key cryptography / Public key infrastructure / Certificate policy / Public key certificate / Certification Practice Statement / Certificate authority / X.509 / Revocation list / S/MIME / Professional certification

        INFN CA Certificate Policy and Certification Practice Statement Version 1.0

        Add to Reading List

        Source URL: security.fi.infn.it

        Language: English - Date: 2011-04-08 05:46:20
        445Jacobs University Bremen / James Won-Ki Hong / Tutorial / Mark Burgess / Teletraffic engineering

        Description The International Conference on Autonomous Infrastructure Management and Security (AIMS) is a highly interactive single-track event integrating • •

        Add to Reading List

        Source URL: www.aims-conference.org

        Language: English - Date: 2008-05-20 12:56:27
        446

        B iometrics Biometrics and the global transportation infrastructure Enhancing security and improving operational efficiency through the implementation of enhanced identification technologies ince 9/11, the transportatio

        Add to Reading List

        Source URL: www.acuity-mi.com

        Language: English - Date: 2004-11-21 20:47:55
          447Message authentication codes / Public-key cryptography / Public key infrastructure / RSA / BurrowsAbadiNeedham logic / XTR

          Pattern-Matching Spi-Calculus∗ Christian Haack Security of Systems Group Faculty of Science, Radboud University Postbus 9010, 6500 GL Nijmegen, The Netherlands

          Add to Reading List

          Source URL: ect.bell-labs.com

          Language: English - Date: 2010-12-15 21:41:03
          448

          Department of Homeland Security Daily Open Source Infrastructure Report

          Add to Reading List

          Source URL: www.dhs.gov

          Language: English
            449Computing / Computer security / Cloud infrastructure / CIO magazine / Apptio / Zscaler / Cloud computing

                           Press  Contacts:            

            Add to Reading List

            Source URL: www.ciosummits.com

            Language: English - Date: 2015-06-24 11:54:18
            450Software quality / Quality assurance / Software assurance / Process management / IEEE standards / Management / Concept of operations / Vulnerability / Computer security / Critical infrastructure protection

            Mitch.Komaroff.CONOPS Nov 06 Overview.ppt

            Add to Reading List

            Source URL: swa.omg.org

            Language: English - Date: 2006-12-14 08:55:32
            UPDATE