Security architecture

Results: 5312



#Item
91Computing / Software / Computer security / Hacking / Computer network security / Software architecture / OWASP / ASP.NET / Application security / Cross-site scripting / Vulnerability / Web application

Microsoft PowerPoint - DenimGroup_IntroductionToApplicationSecurityInDotNETEnvironments.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:05
92Computer network security / Internet privacy / Network architecture / Computing / Crypto-anarchism / Virtual private network / Computer security / Cyberwarfare

VPN Authorization Request The ___________________________________________ (department, division, program) of the Colorado School of Mines has an agreement with ___________________________ (give company and/or individual

Add to Reading List

Source URL: ccit.mines.edu

Language: English - Date: 2011-10-05 10:48:07
93Internet / Computing / Domain name system / Network architecture / Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / OpenDNSSEC / Prague / .se

OpenDNSSEC 1.3 Matthijs Mekking NLnet Labs 26 Mar 2011

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2011-03-27 05:24:21
94Sustainability / Natural environment / Political philosophy / Sustainable architecture / Sustainable building / Sustainable development / Sustainable urban planning / Cuba / Sustainable agriculture / Food security

4th International Convention AGRODESARROLLO 2016 11TH INTERNATIONAL WORKSHOP “TREES AND SHRUBS IN TROPICAL LIVESTOCK PRODUCTION” 5TH INTERNATIONAL SYMPOSIUM “EXTENSION WORK, TECHNOLOGY TRANSFERENCE, SOCIOECONOMIC A

Add to Reading List

Source URL: www.cipav.org.co

Language: English - Date: 2015-12-23 15:11:32
95Distributed data storage / Computing / Concurrent computing / File sharing networks / Distributed computing / File sharing / Kademlia / Kad network / Distributed computing architecture / Peer-to-peer / Overlay network / EMule

SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:40
96Fences / Perimeter security / Electric fence / Pest control / Badgers / Architecture / European badger / Agriculture / Landscape architecture / Agricultural fencing / Barbed wire

Natural England Technical Information Note TIN027 - Badger problems: use of electric fencing to prevent agricultural damage

Add to Reading List

Source URL: www.badgerland.co.uk

Language: English - Date: 2014-11-22 10:40:17
97Data security / Information Systems Security Association / Chambers of commerce / Business / Economy / Commerce / Loveland Chamber of Commerce

Rolls of architecture blueprints concept

Add to Reading List

Source URL: www.chamberorganizer.com

Language: English - Date: 2016-03-16 11:12:26
98Internet / Computing / Network architecture / Domain name system / IP addresses / Routing / Internet security / Streaming / Anycast / Root name server / Google Public DNS / OpenDNS

Characterizing IPv4 Anycast Adoption and Deployment Danilo Cicalese Jordan Augé

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-12-02 16:52:34
99Computing / Software / Computer architecture / Smartphones / Mobile device management / Wi-Fi / Computer security / Mobile app / Android / IOS / Mobile security / Mobile business intelligence

Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Devices A SANS Whitepaper Written by Lee Neely February 2016

Add to Reading List

Source URL: cg9j53d64gz46qncx41jvxq16p-wpengine.netdna-ssl.com

Language: English - Date: 2016-06-14 09:44:32
100Computer architecture / Computing / Computer network security / OS X / Wireless networking / IEEE 802.11 / Wi-Fi / Mac OS X Lion / AirPort / Wi-Fi Protected Access / IEEE 802.1X / Mac OS X Leopard

      Network  Administration  

Add to Reading List

Source URL: it.team.uhsystem.com

Language: English - Date: 2014-02-11 09:45:58
UPDATE