Security architecture

Results: 5312



#Item
181Wireless networking / Backhaul / Network architecture / Cisco Systems

Microsoft Word - IMSA Security Seminar 2015.doc

Add to Reading List

Source URL: www.intuicom.com

Language: English - Date: 2015-08-19 14:16:32
182Inter-process communication / Distributed computing architecture / Network protocols / World Wide Web / Server / Server hardware / Stub / File system / Amoeba / Capability-based security / Clientserver model / Local Procedure Call

PDF Document

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2004-02-09 21:01:22
183Computer network security / Internet privacy / Secure communication / Network architecture / Ethernet / Wi-Fi / Computer security / Virtual private network / Computer network / Mobile security

Microsoft Word - SOUPS poster 11.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-06-02 02:08:32
184Sustainable development / Environmentalism / Sustainable architecture / Sustainable urban planning / Sustainability / Sustainable Development Goals / Food security / Ecological resilience / Global catastrophic risk / German Advisory Council on Global Change / Planetary boundaries

Climate change / sea-level rise in Fiji

Add to Reading List

Source URL: www.nlinunsc.nl

Language: English - Date: 2015-11-27 04:35:07
185United States Department of Justice / Enterprise application integration / United States Department of Homeland Security / Web services / ISO/IEC 11179 / National Information Exchange Model / Service-oriented architecture / IJIS Institute

Global Justice Reference Architecture (JRA) Interviewer Jim Douglas (JD): The following is another conversation in our series of podcasts on justice information sharing national initiatives forThese podcasts ar

Add to Reading List

Source URL: it.ojp.gov

Language: English - Date: 2009-12-30 15:15:25
186Computer network security / Network architecture / Computer security / Cloud computing / Cloud infrastructure / Virtual LAN / Virtual private network / Zscaler / Wireless security

AppGate-Context-Aware-Dynmic-Access-Infographic-rev6-15

Add to Reading List

Source URL: www.cryptzone.com

Language: English - Date: 2016-02-24 15:29:34
187System calls / OpenBSD / Systrace / Time of check to time of use / Kernel / Exec / Wrapper function / Linux kernel / Wrapper / Architecture of Windows NT / Ioctl

Exploiting Concurrency Vulnerabilities in System Call Wrappers Robert N. M. Watson Security Research Group Computer Laboratory

Add to Reading List

Source URL: www.watson.org

Language: English - Date: 2007-08-06 09:53:24
188Mobile technology / Computer access control / Identity management / Security Assertion Markup Language / Mobile network operator / Diameter

An Integrated Accounting and Charging Architecture for Mobile Grids Cristian Morariu, Martin Waldburger, Burkhard Stiller

Add to Reading List

Source URL: gridnets.org

Language: English - Date: 2010-08-10 03:54:15
189Landscape architecture / Access control / Gated community / Real estate / Security engineering / Courtyard / Fountain

San Sebestian 1-bed _ 1. Ground

Add to Reading List

Source URL: www.davenportcayman.com

Language: English - Date: 2013-03-05 17:46:20
190Islamic State of Afghanistan / Afghan Civil War / Pashtun people / War in Afghanistan / Warlord / Taliban / Hamid Karzai / Islamic Emirate of Afghanistan / Abdul Rashid Dostum / Northern Alliance / International Security Assistance Force / Kandahar

Beyond Warlordism. The Local Security Architecture in Afghanistan CONRAD SCHETTER, RAINER GLASSNER, AND MASOOD KAROKHAIL Introduction

Add to Reading List

Source URL: library.fes.de

Language: English - Date: 2007-04-25 04:00:23
UPDATE