Internet layer

Results: 1652



#Item
971Internet / Network architecture / Internet protocols / Internet standards / Network performance / Transport Layer Security / Cipher suite / HTTP Secure / Load balancing / Computing / Cryptographic protocols / Secure communication

CH A P T E R 3 Configuring SSL Termination This chapter describes the steps required to configure a context on the Cisco

Add to Reading List

Source URL: www.cisco.com

Language: English
972Internet / Internet standards / OSI protocols / Internet protocols / Virtual LAN / EtherChannel / Link layer / Open Shortest Path First / Link-state routing protocol / Computing / Network architecture / Routing protocols

Contents at a Glance Introduction ................................................................ 1 AL Book I: Overview ......................................................... 5

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2013-08-25 19:10:46
973Computer architecture / Point-to-Point Tunneling Protocol / MS-CHAP / Internet Protocol Control Protocol / RADIUS / Network access server / Layer 2 Tunneling Protocol / Internet Authentication Service / Password authentication protocol / Internet protocols / Computing / Network architecture

Configuring Cisco IOS Software and Windows 2000 for PPTP Using Microsoft IAS Document ID: 3885 Contents Introduction

Add to Reading List

Source URL: www.cisco.com

Language: English
974Internet / Internet standards / Computer network security / Internet protocols / Data / Transport Layer Security / HTTP Secure / Cryptography / Fortinet / Secure communication / Cryptographic protocols / Computing

SSL Performance Problems – Significant Performance Loss Leaves Much Room for Improvement

Add to Reading List

Source URL: www.nsslabs.com

Language: English - Date: 2014-10-27 14:18:13
975Cryptographic protocols / Internet / Internet protocols / Internet standards / Electronic commerce / Transport Layer Security / HTTP Strict Transport Security / Session hijacking / SSL acceleration / Cryptography / Secure communication / Computing

SSL Server Rating Guide version 2009i (8 December[removed]Copyright © [removed]Qualys SSL Labs (www.ssllabs.com) Abstract The Secure Sockets Layer (SSL) protocol is a standard for encrypted network communication. We feel

Add to Reading List

Source URL: www.ssllabs.com

Language: English - Date: 2015-01-19 14:14:14
976Network performance / Networks / Content delivery network / Internet television / Streaming / Reverse proxy / Throughput / Transmission Control Protocol / Transport Layer Security / Computing / Concurrent computing / Distributed computing

Blue Shell Games Gives Gamers the Fastest App Downloads

Add to Reading List

Source URL: web1.cachefly.net

Language: English - Date: 2015-01-02 12:01:43
977Internet protocols / Network performance / Internet standards / Transmission Control Protocol / Network congestion / Flow control / Traffic flow / Transport layer / Communications protocol / Computing / Data / Information

RFC896   RFC896 Network Working Group John Nagle Request For Comments: 896 6 January 1984 Ford Aerospace and Communications Corporation

Add to Reading List

Source URL: wizard.ae.krakow.pl

Language: English - Date: 2005-12-04 17:01:03
978Internet / Cryptographic protocols / Internet protocols / Email / Internet privacy / Transport Layer Security / Simple Mail Transfer Protocol / Information security / Cryptography / Security / Secure communication / Computing

Whitepaper of the SGRP Special Interest Group "Secure Information eXchange (SIX)"

Add to Reading List

Source URL: www.sgrp.ch

Language: English - Date: 2011-06-28 13:36:53
979Internet / Electronic commerce / Secure communication / Network architecture / Transport Layer Security / Cloud computing / Computing / Internet standards / Internet protocols

BioBrain  Security  and  Networking  Overview   Bill Kratzer Chief Technology Officer BioHitech America [removed]

Add to Reading List

Source URL: static.biohitechcloud.com

Language: English - Date: 2014-08-20 12:22:01
980Cryptographic hash functions / Hashing / SHA-2 / Transport Layer Security / SHA-1 / HMAC / Message authentication code / Collision attack / Key size / Cryptography / Cryptographic protocols / Internet protocols

Approved Cryptographic Algorithms Good Practice Guideline Programme NHS Informatics

Add to Reading List

Source URL: systems.hscic.gov.uk

Language: English
UPDATE