Security architecture

Results: 5312



#Item
151Software / System software / Computer architecture / Access control / POSIX / Unix / System calls / Sandbox / Capability-based security / File descriptor / Mandatory access control / Unix domain socket

fig-capsicum-processes.graffle

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-03-09 05:43:31
152Software / Computer security / System software / Antivirus software / Malwarebytes Anti-Malware / Malwarebytes / Malware / Avira / Zero-day / Computer virus / IObit

C A S E S T U DY SCB builds a defense against malware Architecture firm takes preventive approach to malware with Malwarebytes Anti-Malware and gains dramatic time savings Business profile

Add to Reading List

Source URL: pt.malwarebytes.com

Language: English - Date: 2016-07-07 18:41:23
153Micro Focus International / SUSE Linux / Computer network security / Computing / SUSE Linux distributions / SUSE / Port forwarding / Novell / Linux / Computer architecture / Linux distributions

Architecting your SUSE Manager deployment SUSECon 2015, Amsterdam, The Netherlands Gábor Nyers

Add to Reading List

Source URL: www.susecon.com

Language: English - Date: 2015-11-20 11:19:28
154Computing / Internet / E-commerce / Internet security / Secure communication / Transport Layer Security / Server / Network architecture

Jarrett & Lam Limited The Laurels, 75 Reigate Road, Hookwood, Surrey RH6 0HL www.jarrettandlam.com Terms and Conditions for operating Vacancy Lab on a cloud server or over the internet.

Add to Reading List

Source URL: www.vacancylab.com

Language: English - Date: 2015-12-18 09:30:09
155Crime prevention / Prevention / Security / Safety / Criminology / Law enforcement / Security engineering / National security / Crime prevention through environmental design / Surveillance / Defensible space theory / Closed-circuit television

Published in: Internationale Architecture Biennale Rotterdam (ed.) Open City: Designing Coexistence, Amsterdam: Sun 2009, Michael Zinganel Crime does pay! The Structure-Building Power of Crime for Urban Planning

Add to Reading List

Source URL: www.zinganel.mur.at

Language: English - Date: 2014-03-04 19:28:21
156National Register of Historic Places in Miami /  Florida / Security Building / Mansard roof / Construction / Architecture / Littleton Main Street / Grade II listed buildings in Liverpool-L2

SECURITY BUILDING 117 NE 1ST AVENUE Designation Report City of Miami

Add to Reading List

Source URL: www.historicpreservationmiami.com

Language: English - Date: 2016-05-11 12:43:54
157Software / Computer security / System software / Antivirus software / Malwarebytes Anti-Malware / Malwarebytes / Malware / Avira / Zero-day / Computer virus / IObit

C A S E S T U DY SCB builds a defense against malware Architecture firm takes preventive approach to malware with Malwarebytes Anti-Malware and gains dramatic time savings Business profile

Add to Reading List

Source URL: fr.malwarebytes.com

Language: English - Date: 2016-07-07 18:35:52
158Computing / Network architecture / Internet protocols / Secure communication / World Wide Web / Computer networking / Transport Layer Security / QUIC / Proxy server / SPDY / HTTPS / Hypertext Transfer Protocol

The Cost of the “S” in HTTPS David Naylor? , Alessandro Finamore† , Ilias Leontiadis‡ , Yan Grunenberger‡ , Marco Mellia† , Maurizio Munafò† , Konstantina Papagiannaki‡ , and Peter Steenkiste? ? Carnegi

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:56:14
159Computing / Computer architecture / Security engineering / Computer network security / Dynamic Host Configuration Protocol / Network service / Windows / Computer security

SECURITY COMPLIANCE MANAGEMENT THE ELEMENTAL COMPLIANCE SYSTEM Managing security in ever-changing enterprise networks requires that compliance officers and IT security managers continuously measure how well networked co

Add to Reading List

Source URL: www.nsaservices.com

Language: English - Date: 2013-03-28 15:31:27
160Computing / Network architecture / Internet / Network performance / Cryptographic protocols / Secure communication / Internet protocols / Flow control / Transmission Control Protocol / Transport Layer Security / TCP congestion control / HTTPS

HEIST: HTTP Encrypted Information can be Stolen through TCP-windows Mathy Vanhoef and Tom Van Goethem iMinds-DistriNet -

Add to Reading List

Source URL: tom.vg

Language: English - Date: 2016-08-03 21:35:58
UPDATE