Security architecture

Results: 5312



#Item
161Ethernet / Gigabit Ethernet / Category 5 cable / Computing / Optical fiber / Network architecture / Equipment / Fibre to the office / ISO/IEC 11801

_____________________________________________________________________________________________________________ Mechanical and Electrical Engineers • Since 1933 COMMUNICATIONS / ELECTRONIC SECURITY PROJECTS Manning Regi

Add to Reading List

Source URL: www.wlc-kc.net

Language: English - Date: 2013-11-14 18:25:54
162Computer architecture / Software / SUSE Linux / Computing / Micro Focus International / SUSE / Security-Enhanced Linux / Linux / SUSE Linux Enterprise Server

SUSE_Powerpoint_Slide_Library_010616 copy

Add to Reading List

Source URL: www.digitale-nachhaltigkeit.ch

Language: English - Date: 2016-06-27 01:17:47
163Security / Identity management / Crime prevention / Cryptography / Information governance / National security / Prevention / Privacy / Internet privacy / Computer security

GMOC and GENI Security Architecture – Joint Effort  The  team   currently  plans to implement  attribute­based credential  mechanisms  to enforce   the  policies for sharing operational data w

Add to Reading List

Source URL: groups.geni.net

Language: English - Date: 2009-07-15 10:58:06
164Computing / Network architecture / Computer network security / Internet / Internet Standards / Dynamic Host Configuration Protocol / Network service / IP address / Virtual private network / Computer network / Gateway

Microsoft Word - SnapGearQuickInstalldoc

Add to Reading List

Source URL: go.mcafee.com

Language: English - Date: 2004-02-15 19:36:51
165Internet / Computing / Domain name system / Internet Standards / Internet protocols / Network architecture / Key management / DNSSEC / Domain Name System Security Extensions / Domain name registry / Domain name / Domain name registrar

ARI Registry Services DNSSEC Practice Statement Thursday, 19 March 2013 DNSSEC Practice Statement

Add to Reading List

Source URL: rightside.co

Language: English - Date: 2016-03-30 04:56:00
166Computing / Network protocols / Computer network security / Computer networking / Network architecture / Networking hardware / Software-defined networking / OpenFlow / Router / Packet processing / Routing / Virtual LAN

Merlin: A Language for Provisioning Network Resources Robert Soulé* Shrutarshi Basu† Parisa Jalili Marandi* Fernando Pedone* Robert Kleinberg† Emin Gün Sirer† Nate Foster† * University of Lugano † Cornell Uni

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:56:52
167Computing / Computer networking / Computer network security / Network architecture / Network management / Local area networks / Open vSwitch / Software-defined networking / Traffic flow / Firewall / Load balancing / NetFlow

Virtual Network Diagnosis as a Service Wenfei Wu, Guohui Wang, Aditya Akella, Anees Shaikh Abstract Today’s cloud network platforms allow tenants to construct sophisticated virtual network topologies among their VMs on

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2013-10-01 17:21:19
168Computing / Internet / Network architecture / Internet Standards / Internet protocols / Computer network security / RADIUS / Transport Layer Security / IEEE 802.1X / AirMarshal / OpenVPN / Wireless security

VersionIEA Software, Inc. Software License Agreement By purchasing or installing Air Marshal Authentication Gateway, you indicate your acceptance

Add to Reading List

Source URL: www.iea-software.com

Language: English - Date: 2015-05-12 23:32:47
169Architecture / Doors / Gates / Construction / Rooms / Locksmithing / Door / Garage door / Garage / Vehicle door / Dead bolt / Window

Home Security Inspection Checklist Provided by the National Sheriff’s Association and the Hoover Police Department.

Add to Reading List

Source URL: www.hooverpd.com

Language: English - Date: 2015-11-18 12:01:36
170Computing / Network architecture / Computer networking / Crime prevention / Cryptography / National security / Network segmentation / Virtual firewall / Data center / Check Point / Computer security / Information security

Whitepaper Unlock the full potential of data center virtualization with micro-segmentation Making software-defined security (SDS) work for your data center It’s time to unlock the full potential

Add to Reading List

Source URL: www.nttsecurity.com

Language: English - Date: 2016-07-26 13:04:40
UPDATE