Layer

Results: 11051



#Item
441Cartography / Esri / Redlands /  California / Remote sensing / OpenStreetMap / Geographic information system / GIS software / Geography / Geographic data and information / California

Service Layer Credits: Sources: Esri, HERE, DeLorme, USGS, Intermap, increment P Corp., NRCAN, Esri Japan, METI, Esri China (Hong Kong), Esri (Thailand), MapmyIndia, © OpenStreetMap contributors, and the GIS User Commun

Add to Reading List

Source URL: www.dhr.virginia.gov

Language: English - Date: 2016-05-18 11:53:46
442Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Data transmission / Handshaking / Network architecture / Authenticated encryption / Transport Layer Security

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer Christian Badertscher1, Christian Matt1, Ueli Maurer1, Phil Rogaway2, Björn Tackmann3 1ETH

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
443Chemistry / Matter / Building materials / Corrosion prevention / Corrosion / Passivation / Stainless steel / Rust / Pickling / Aluminium / Nitric acid / Iron

DERUSTIT Passivating solution 2016 Properties Stainless steel owes its corrosion resistance to a very thin oxide layer on its surface. This layer can be locally damaged or broken by welding, grinding, machining, etc., an

Add to Reading List

Source URL: www.specialisedwelding.co.uk

Language: English - Date: 2014-10-20 07:49:52
444Computing / Network architecture / OSI protocols / Media technology / Computer networking / Local area networks / Internet protocol suite / Virtual LAN / Network switch / Network layer / Firewall / Communications protocol

Affordable. Flexible. OnTarget. A Solid Technical Foundation is Critical for; Selling, Designing, Implementing and Maintaining Communications Products and Solutions. The Foundational Technology Assessment is focused on t

Add to Reading List

Source URL: cdn.westnetlearning.com

Language: English - Date: 2014-03-06 12:57:30
445

Infraestructura de Datos Espaciales Española GTIDEE CONSEJO SUPERIOR GEOGRÁFICO Styled Layer Descriptor (SLD)

Add to Reading List

Source URL: www.idee.es

Language: Spanish - Date: 2012-03-22 08:54:33
    446Chemistry / Chromatography / Food and drink / Biology / Peppermint / Thin-layer chromatography / High performance thin layer chromatography / Eriocitrin / Flavonoid / Eriodictyol / Polyphenol / Phenols

    Original Article HPTLC Analysis of Mentha piperita and Citrus sinensis S.K. Gangai Abirami*1 and P. Nirmala2 1

    Add to Reading List

    Source URL: www.imedpub.com

    Language: English
    447Computing / Java platform / Kerberos / Transport Layer Security / Java Development Kit / Java security / Oracle Corporation / OpenJDK / Cryptographic hash function / Oracle Database / Java / Generic Security Services Application Program Interface

    1 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Using the New JDK 8 Security Features

    Add to Reading List

    Source URL: blogs.oracle.com

    Language: English - Date: 2013-09-25 13:14:11
    448Computing / Software engineering / Information technology management / Enterprise architecture / Software architecture / ATM adaptation layer / Reference model / Service-oriented architecture / Deliverable / Reference architecture

    IP project numberProject coordinator: Joe Gorman Strategic Objective: 7.1.b Project duration: February 2010 – February 2014 Project Coordinator Organisation: SINTEF, Norway

    Add to Reading List

    Source URL: depot.universaal.org

    Language: English - Date: 2014-01-08 10:07:47
    449Computing / Network architecture / Computer network security / Tunneling protocols / Virtual private networks / Internet protocols / Cryptographic protocols / IPsec / Internet security / Transport Layer Security / SoftEther VPN / Secure Socket Tunneling Protocol

    Security Review: SSL VPNs —Frederick M. Avolio Executive Summary Today’s enterprises use the Internet to meet a variety of communication needs among employees, business partners, suppliers, customers, and potential c

    Add to Reading List

    Source URL: www.avolio.com

    Language: English - Date: 2007-12-29 18:01:44
    450Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Computer access control / Internet Standards / Internet protocols / Transport Layer Security / OpenSSL / Authentication / Password

    eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirchen

    Add to Reading List

    Source URL: norbert-pohlmann.com

    Language: English - Date: 2015-10-20 13:18:07
    UPDATE