Kerberos

Results: 405



#Item
321Software / Apache Hadoop / Cloud computing / Cloud infrastructure / Encryption / Kerberos / System software / Computing / Cryptography / Cryptographic software

HDFS Encryption Conceptual Design Proposal As of June[removed]Terminology Encryption  Zone:  An   Encryption  Zone  (EZ)  is  a  FileSystem  subtree  where  all  the  files   are  encrypted.  

Add to Reading List

Source URL: issues.apache.org

Language: English
322Directory services / Internet protocols / Network file systems / Email / Internet standards / Server Message Block / Kerberos / Group Policy / Microsoft Open Specification Promise / Computing / Microsoft Windows / Software

PDF Document

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2013-07-23 18:33:24
323Internet protocols / Internet standards / Network file systems / Lightweight Directory Access Protocol / Active Directory / Email / Server Message Block / Kerberos / Windows / Computing / Directory services / Internet

PDF Document

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2014-05-08 17:42:23
324Internet protocols / Computer networking / Network performance / Proxy server / Transport Layer Security / Windows Server / Email / Kerberos / Features new to Windows XP / Computing / Internet / Internet privacy

The MyDelivery Client and API

Add to Reading List

Source URL: archive.nlm.nih.gov

Language: English - Date: 2010-06-09 22:12:53
325Identification / Government / Kerberos / Security / Identity document / Internet Relay Chat

Some Questions and Answers about the new Client Identification ad Verification regulations

Add to Reading List

Source URL: nsbs.org

Language: English - Date: 2011-12-16 12:09:21
326Computing / Critical Security Parameter / Wireless security / FIPS 140-2 / IEEE 802.1X / Advanced Encryption Standard / Kerberos / Dynamic SSL / Computer network security / Cryptography / Computer security

Microsoft Word - Secure Client Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-08-20 01:00:00
327Computer network security / Solaris Trusted Extensions / Solaris / Kerberos / Sun Microsystems / Pluggable authentication module / SunOS / Security-focused operating system / Trusted operating system / Software / Computing / System software

There and Back Again – A Solaris Security Tale Glenn Brunette Distinguished Engineer Sun Microsystems, Inc.

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2012-07-31 09:52:12
328Computer security / FIPS 140 / Password / Kerberos / Critical Security Parameter / Access control / PKCS / Security and safety features new to Windows Vista / Microsoft CryptoAPI / Cryptography standards / Cryptography / Security

Microsoft Word - Tropos Control Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-12-02 00:00:00
329Hadoop / Cloud infrastructure / Apache Hadoop / Cloudera / HBase / MapR / Kerberos / Big data / Information security / Cloud computing / Computing / Centralized computing

Cloudera_logo_tag_colortest_090912

Add to Reading List

Source URL: wcc.on24.com

Language: English - Date: 2014-04-10 01:02:44
330Internet protocols / Computer networking / Network performance / Proxy server / Transport Layer Security / Windows Server / Email / Kerberos / Features new to Windows XP / Computing / Internet / Internet privacy

The MyDelivery Client and API

Add to Reading List

Source URL: ceb.nlm.nih.gov

Language: English - Date: 2010-06-09 22:12:53
UPDATE