Security architecture

Results: 5312



#Item
241Internet protocols / Cryptographic protocols / Internet Standards / Secure communication / Network architecture / Border Gateway Protocol / Network address translation / Transport Layer Security / HTTPS / Internet protocol suite / Virtual private network

Communication Networks Spring 2016 Laurent Vanbever www.vanbever.eu

Add to Reading List

Source URL: comm-net.ethz.ch

Language: English - Date: 2016-05-22 14:43:12
242

SecretAgent® 6.0 Encryption Architecture Plaintext File(s) © Information Security Corp. All rights reserved

Add to Reading List

Source URL: www.infoseccorp.com.

- Date: 2008-11-20 13:37:29
    243Software / Computer architecture / Computing / Android / Smartphones / Alphabet Inc. / App store / Mobile app / Google Play / Yo / Universal Windows Platform apps / Mobile security

    PDF Document

    Add to Reading List

    Source URL: web.engr.illinois.edu

    Language: English - Date: 2015-11-16 12:12:35
    244Computing / Domain name system / Internet / Network architecture / Internet privacy / Computer network security / DNS hijacking / Hacking / Transmission Control Protocol / Proxy server / CNAME record / Captive portal

    On Robust Covert Channels Inside DNS Lucas Nussbaum, Pierre Neyron and Olivier Richard Abstract Covert channels inside DNS allow evasion of networks which only provide a restricted access to the Internet. By encapsulatin

    Add to Reading List

    Source URL: www.loria.fr

    Language: English - Date: 2011-10-12 09:35:39
    245Ambient intelligence / Internet of things / Gateway / Industrial Internet Consortium / Fog computing / Cloud computing / Big data / Computer security / Jasper Technologies / Web of Things

    Cloud Customer Architecture for IoT

    Add to Reading List

    Source URL: www.cloud-council.org

    Language: English - Date: 2016-02-19 15:02:05
    246Data management / Sqrrl / Business intelligence / Distributed computing architecture / Big data / NoSQL / Security information and event management / Analytics / Apache Accumulo / User behavior analytics

        DATASHEET SQRRL ENTERPRISE BIG DATA SECURITY ANALYTICS USE CASE

    Add to Reading List

    Source URL: sqrrl.com

    Language: English - Date: 2014-10-07 15:54:16
    247

    Ostro OS security architecture An IoT OS security architecture that is so boring that you can sleep soundly at night Ismo Puustinen, Intel Finland What is Ostro OS?

    Add to Reading List

    Source URL: events.linuxfoundation.org

    Language: English - Date: 2016-03-24 14:26:15
      248

      MS RPC Architecture & Security Problems Related kkqq (Lin Yichong) (kk kkqq@SST, kkqq@USTC) http://www.0x557.org http://kkqq.blogdns.com

      Add to Reading List

      Source URL: xcon.xfocus.org

      Language: English - Date: 2004-01-04 11:00:00
        249Web services / Computing / World Wide Web / Web of Things / Service-oriented architecture / Devices Profile for Web Services / Internet of things / Web Services Description Language / WS-Security based products and services / Project Metro

        In Search of an Internet of Things Service Architecture: REST or WS-*? A Developers’ Perspective Dominique Guinard, Iulia Ion, and Simon Mayer Institute for Pervasive Computing, ETH Zurich, Switzerland, dguinard|iulia.

        Add to Reading List

        Source URL: www.vs.inf.ethz.ch

        Language: English
        250Computing / Cloud computing / Cloud infrastructure / Software architecture / Cloud storage / As a service / Amazon Web Services / Web hosting / Data center / Software as a service / Load balancing / Application server

        BeBanjo Infrastructure and Security Overview Can you trust Software-as-a-Service (SaaS) to run your business? Is your data safe in the cloud? At BeBanjo, we firmly believe that SaaS delivers great benefits to our custome

        Add to Reading List

        Source URL: bebanjo.com

        Language: English - Date: 2016-04-13 04:48:08
        UPDATE