Security architecture

Results: 5312



#Item
201Instruction set architectures / Central processing unit / Computer architecture / Memory management / Memory protection / Capability-based security / Pointer / MIPS instruction set / 64-bit computing / Instruction set / Reduced instruction set computing / Kernel

Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-12-01 06:21:41
202Surveillance / Video surveillance / Physical security / Video / Security / Video management system / Closed-circuit television / Red Digital Cinema Camera Company / NVR / IQinVision / Aventura Technologies

Distributed Architecture_en

Add to Reading List

Source URL: www.surveon.com

Language: English - Date: 2014-07-31 01:16:43
203Mobile device management / Mobile computers / Bring your own device / Enterprise architecture / Zenprise / Sybase iAnywhere

Press Release Mobile Security Landscape Challenging IT on How to Best Secure Mobile Deployments, According to New Research by VDC The enterprise mobility opportunity has led to a very fragmented mobile security landscape

Add to Reading List

Source URL: www.vdcresearch.com

Language: English - Date: 2016-02-01 13:56:27
204Transport Layer Security / Network architecture / Internet protocols / Cryptographic protocols / Network protocols / Gossip protocol / Hypertext Transfer Protocol / Internet Relay Chat / HTTPS / Certificate authority / Clientserver model / Simple Mail Transfer Protocol

Efficient Gossip Protocols for Verifying the Consistency of Certificate Logs Laurent Chuat Pawel Szalachowski

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-11-04 13:06:02
205Computer network security / Computer security / Software architecture / Data security / Web application security / Firewall / Application security / Web application / Application firewall / Application server

Microsoft PowerPoint - ISSA Dallas Presentation.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:23
206Enterprise application integration / Information technology governance / SOA governance / SOA Security / Web services / Architectural pattern / Service-oriented architecture / Thomas Erl

SOA Certified Professional (SOACP) Certification Matrix Use this matrix to map exam requirements to certification tracks. These views can help you plan certification paths and discover how exams that you have passed m

Add to Reading List

Source URL: www.soaschool.com

Language: English - Date: 2015-12-02 17:52:00
207Computer network security / Network architecture / Computer networking / Crypto-anarchism / Internet privacy / Virtual private network / Routing / Traffic flow / Computer network

Traffic Matrix Estimation for Low-loss Routing in Hybrid Networks by George Manning Porter Research Project Submitted to the Department of Electrical Engineering and Computer Sciences, University of California at Berkele

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-05-11 21:34:04
208Computer access control / Access control / Identity management / Authentication / Notary / Packaging / Authorization / Password / User / Java Authentication and Authorization Service

Hudson Security Architecture Winston Prakash

Add to Reading List

Source URL: hudson-ci.org

Language: English - Date: 2012-02-24 08:32:09
209Network architecture / Computer network security / Cryptographic protocols / Network protocols / Computer networking / 6WIND / Data Plane Development Kit / Open vSwitch / IPsec / Internet Key Exchange / Virtual private network / NAT traversal

TurboIPsec TM COTS Based IPsec VPN Solution With Scalable Performance

Add to Reading List

Source URL: www.6wind.com

Language: English - Date: 2016-07-25 19:28:57
210Cryptographic protocols / Internet protocols / IPsec / Tunneling protocols / Network architecture / Security Parameter Index / Internet security / Internet Key Exchange / Internet protocol suite / IPv6 / Transmission Control Protocol / Internet Security Association and Key Management Protocol

Microsoft PowerPoint - ch5.ppt [相容模式]

Add to Reading List

Source URL: people.cs.nctu.edu.tw

Language: English - Date: 2012-08-25 21:41:01
UPDATE