Internet layer

Results: 1652



#Item
261Secure communication / Transport Layer Security / Symmetric-key algorithm / RC4 / Block cipher modes of operation / Stream cipher / Ciphertext / Padding / Cryptographic hash function / Cryptography / Cryptographic protocols / Internet protocols

1 SSL, TLS, and Cryptography We live in an increasingly connected world. During the last decade of the 20th century the Internet rose to popularity and forever changed how we live our lives. Today we rely on our phones a

Add to Reading List

Source URL: sslmate.com

Language: English - Date: 2015-06-06 19:18:36
262Internet / Unified threat management / Layer 2 Tunneling Protocol / Virtual private network / Proxy server / Point-to-Point Tunneling Protocol / Anti-spam techniques / Check Point / Comparison of firewalls / Computer network security / Computing / Network architecture

GB-2500 Gigabit Firewall UTM Appliance The GB-2500 Firewall UTM Appliance is a powerful and robust UTM appliance designed for businesses with extensive network demands. Powerful Gigabit Unified Threat Management Performa

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2014-10-21 12:09:09
263Internet standards / Microsoft Windows / Email / Lightweight Directory Access Protocol / Transport Layer Security / Security and safety features new to Windows Vista / Encrypting File System / Computing / Internet / Internet protocols

AirZip® FileSECURE™ Features Communicate with Confidence™ AirZip FileSECURE offers a range of unparalleled advanced features that make it the most secure choice for securing your sensitive and confidential files and

Add to Reading List

Source URL: www.airzip.com

Language: English - Date: 2010-03-14 04:20:00
264Akamai Technologies / Content delivery network / Prolexic Technologies / Networks / Denial-of-service attack / Computing / Concurrent computing / Internet

AKAMAI WEB SECURITY SOLUTIONS: PRODUCT BRIEF Prolexic Flow-Based Monitoring Network-layer monitoring for early detection and notification of potential DDoS attacks Organizations increasingly interact with customers, em

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2015-04-06 03:50:01
265Cryptographic protocols / Secure communication / Electronic commerce / Network architecture / Transport Layer Security / FTPS / HTTP Secure / Public key certificate / SSL-Explorer: Community Edition / Computing / Internet / Internet standards

SSL Browser & Client Remote Access Browser and Client Global Technology Associates provides a SSL remote access solution featuring both a Browser and a Client for secure network access. GTA SSL Key Features • Seamless

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2012-12-06 11:38:44
266Akamai Technologies / Content delivery network / Prolexic Technologies / Networks / Denial-of-service attack / Computing / Concurrent computing / Internet

AKAMAI WEB SECURITY SOLUTIONS: PRODUCT BRIEF Prolexic Flow-Based Monitoring Network-layer monitoring for early detection and notification of potential DDoS attacks Organizations increasingly interact with customers, em

Add to Reading List

Source URL: www.akamai.de

Language: English
267Electronic commerce / Secure communication / Internet / Computer networking / Windows Server / Transport Layer Security / Computer security / Security service / Security and safety features new to Windows Vista / Computing / Computer network security / Security

PDF Document

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2001-08-05 10:53:54
268Data / Data transmission / Teletraffic / Internet protocols / Flow control / Logical Link Control / Network congestion / Asynchronous Transfer Mode / Transport layer / Network performance / Computing / Information

PDF Document

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 1999-11-15 17:16:45
269OSI protocols / Wireless networking / Telecommunications engineering / Internet protocols / Communications protocol / Protocols / Wireless sensor network / TinyOS / Data link layer / Computing / Data / Network architecture

PDF Document

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2007-04-24 13:22:22
270Internet / Unified threat management / Virtual private network / Layer 2 Tunneling Protocol / Internet security / Proxy server / Check Point / Comparison of firewalls / Computer network security / Computing / Computer security

GB-850 Gigabit Firewall UTM Appliance The GB-850 Firewall UTM Appliance is Global Technology Associates’ mid-range product for remote/branch corporate offices desiring total perimeter security.

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2014-04-17 16:44:48
UPDATE