Secure Network Communications

Results: 121



#Item
41Information / Local Interconnect Network / Computer buses / On-board diagnostics / Secure Digital / Universal Serial Bus / Vehicle bus / Communications protocol / Universal asynchronous receiver/transmitter / Computer hardware / Data transmission / Data

INTREPID CONTROL SYSTEMS, INC. neo VI RED Low Cost, High Value CAN and LIN Bus Interface

Add to Reading List

Source URL: cdn.intrepidcs.net

Language: English - Date: 2015-04-15 13:26:06
42Software testing / Secure communication / Hacking / Electronic commerce / Computer network security / Vulnerability / Communications protocol / Computer security / Transmission Control Protocol / Computing / Data / Security

Automatic Generation of Certifiable Aerospace Communication Software Johann Schumann and Ewen Denney RIACS / NASA Ames, Moffett Field, CA 94035 {schumann|edenney}@email.arc.nasa.gov

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-04-11 20:12:52
43Cisco Systems / Virtual private network / Cisco IOS / Supplicant / Cisco ASA / Cisco Career Certifications / Cisco Unified Communications Manager / Computer network security / Computing / Electronics

At-A-Glance Cisco AnyConnect Secure Mobility Solution

Add to Reading List

Source URL: www.cisco.com

Language: English
44Broadband / Media technology / Videotelephony / Telephony / Voice over IP / Network architecture / Burglar alarm / BT 21CN / Communications protocol / Technology / Electronic engineering / Electronics

White Paper Secure Managed Messaging for the 21st Century

Add to Reading List

Source URL: www.mcmelectronics.com.au

Language: English - Date: 2009-06-17 20:42:12
45Network protocols / XO Communications / Computer network security / Internet privacy / Telecommunications engineering / Multiprotocol Label Switching / OLPC XO-1 / Virtual private network / Voice over IP / Network architecture / Computing / Computer architecture

XO® MPLS IP-VPN XO MANAGED SERVICES For multi-location businesses that require secure T-1 or higher services, XO Communications offers flexible, intelligent, managed network solutions that provide more bandwidth for the

Add to Reading List

Source URL: www.comtechinc.biz

Language: English - Date: 2007-08-10 19:20:43
46Internet / Concurrent computing / Verio / NTT Communications Corp / Data center / Backup / Dedicated hosting service / Computer security / Internet backbone / Computing / Nippon Telegraph and Telephone / Web hosting

HyperOffice’s State of The Art Hosting Facility Network Reliability At HyperOffice we strive to provide highly secure and reliable hosting services to our customers. To this end we have selected NTT/VERIO as our hosti

Add to Reading List

Source URL: www.hyperoffice.com

Language: English - Date: 2012-05-15 22:36:43
47SAP NetWeaver Portal / SAP NetWeaver / SAP AG / Java Platform /  Enterprise Edition / Exploit / Computing platform / Vulnerability / Secure Network Communications / SAP Logon Ticket / Computing / Business software / Software

Security Research Advisory – August 16, 2011 SAP J2EE engine compromised What happened? At the 2011 BlackHat conference, which was held in Las Vegas on August 3-4, Russian researcher Alexander Polyakov revealed a vuln

Add to Reading List

Source URL: www.denyall.com

Language: English - Date: 2015-02-25 05:20:11
48Information / FIPS 140-2 / FIPS 140 / Router / Network switch / Cryptographic Module Validation Program / IP multicast / Communications protocol / Avaya Secure Router / Cryptography standards / Computing / Data

Curtiss-Wright CCA-685 Secure Router Hardware Version: CCA-685-C2820; Firmware Version: 2.1 FIPS[removed]Non-Proprietary Security Policy FIPS Security Level: 2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-02-06 07:30:12
49Information / Computer network security / Cryptographic protocols / Internet protocol suite / General Packet Radio Service / Virtual private network / Secure communication / Communications protocol / IPsec / Computing / Internet privacy / Data

Microsoft Word - Security and the use of Public IP networks.doc

Add to Reading List

Source URL: www.mcmelectronics.com.au

Language: English - Date: 2009-06-17 20:41:57
50Cisco IOS / Routers / TACACS / Cisco Systems / Cisco Catalyst / Operating system / Command-line interface / Cisco PIX / Cisco Unified Communications Manager / Computer network security / Computing / Network architecture

White Paper Building a Scalable Network Device Management Framework with the Cisco Secure ACS TACACS+ (RBAC) Server Abstract Cisco Secure ACS 3.0 Shell Authorization Command sets provide the facilities to enable the

Add to Reading List

Source URL: www.extraxi.com

Language: English - Date: 2009-05-29 07:46:56
UPDATE