Internet layer

Results: 1652



#Item
371Computer security / Deep packet inspection / System software / Security appliance / Content filtering / Firewall / Content-control software / Computer network security / Computing / Server appliance

ContentProtect Security Appliance The ContentProtect Security Appliance is a deep-packet, Layer 7 inspection appliance that scans, identifies, and controls Internet traffic—and provides advanced content filtering, rep

Add to Reading List

Source URL: www.contentwatch.com

Language: English - Date: 2011-07-13 15:00:12
372Computing / Cryptographic protocols / Datagram Transport Layer Security / Middlebox / Spud / Protocol stack / Communications protocol / Data / Information / Internet protocols

Substrate Protocol for User Datagrams (SPUD) Status Joe Hildebrand

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2015-03-23 11:03:18
373Internet standards / Internet protocols / Cryptographic protocols / Secure communication / Public-key cryptography / Transmission Control Protocol / Lightweight Directory Access Protocol / Transport Layer Security / Certificate authority / Cryptography / Computing / Internet

SSL Protocol The Transmission Control Protocol/Internet Protocol (TCP/IP) governs the transport and routing of data over the Internet. Other protocols, such as the Hypertext Transport Protocol (HTTP), Lightweight Directo

Add to Reading List

Source URL: www.cryptoheaven.com

Language: English - Date: 2011-03-01 12:16:22
374Internet / Transport Layer Security / Customer service / Computing / Business / Electronic commerce / Internet standards / Online shopping

Pricing Policy All of our prices are in Australian dollars (AUD) and include GST (Goods and services tax). Refund Policy If you can’t attend a course due to unplanned events, you can send someone else from your service

Add to Reading List

Source URL: www.cscentral.org.au

Language: English - Date: 2011-08-11 22:25:37
375Computing / Internet protocols / Security / Internet standards / Transport Layer Security / Cipher suite / HTTP Secure / Public-key cryptography / Key / Cryptography / Secure communication / Cryptographic protocols

SSL and TLS An Overview of A Secure Communications Protocol Simon Horman aka Horms

Add to Reading List

Source URL: horms.net

Language: English - Date: 2005-04-17 17:27:10
376Internet protocols / Internet standards / Multihoming / Stream Control Transmission Protocol / Streaming / Computer network security / Transport layer / Transmission Control Protocol / Firewall / Network architecture / Internet / Computing

Basic Protocols 25 Figure 2.3: These are phase diagrams of the sequence number generators for four operating systems. The lower right shows a correct implementation of RFC 1948 sequence number generation (by FreeBSD 4.6

Add to Reading List

Source URL: www.wilyhacker.com

Language: English - Date: 2004-11-16 15:11:46
377Internet standards / Usenet / HTTP / MIME / Quoted-printable / Perl / Base64 / Computing / Email / OSI protocols

Perl versiondocumentation - PerlIO::via::QuotedPrint NAME PerlIO::via::QuotedPrint - PerlIO layer for quoted-printable strings SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 14:53:28
378Computing / Network architecture / Secure communication / Cryptographic protocols / Electronic commerce / Transport Layer Security / Transmission Control Protocol / Lightweight Directory Access Protocol / Cipher suite / Internet protocols / Internet standards / Internet

Network Working Group Request for Comments: 4681 Updates: 4346 Category: Standards Track S. Santesson

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2006-10-10 19:17:44
379Internet / Electronic commerce / Secure communication / Transport Layer Security / Server / Transparent Data Encryption / Encrypting File System / I2P / Computing / Software / Internet standards

Client Accessible Encrypted Server Storage By combining SSL and Transparent Data Encryption technologies into client-server type architecture we are able to create an encrypted data storage and messaging solution. Simpli

Add to Reading List

Source URL: www.cryptoheaven.com

Language: English - Date: 2011-03-01 12:37:51
380Computing / Public-key cryptography / Internet / Security / Internet standards / Transport Layer Security / Buffer overflow / HTTP Secure / Transmission Control Protocol / Cryptographic protocols / Secure communication / Electronic commerce

Tales from the Crypt: fingerprinting attacks on encrypted channels by way of retainting Michael Valkering Asia Slowinska

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-10-21 09:38:52
UPDATE