Security architecture

Results: 5312



#Item
261Software / Computing / Application software / Internet privacy / Network architecture / SCADA / Computer network security / Humancomputer interaction / Virtual private network / WinCC / Usability / Accessibility

Position Software Engineer (Visualization) (m/f) Reporting to

Add to Reading List

Source URL: www.apateq.com

Language: English - Date: 2015-07-31 10:56:11
262

Arista v. Cisco Request 15 Oct 15 Authentication requested for: RFC 2401 Security Architecture for the Internet Protocol

Add to Reading List

Source URL: iaoc.ietf.org

- Date: 2015-11-01 16:21:27
    263Internet / Computing / Network architecture / Internet security / Secure communication / Content delivery network / Tor / Dark web / Cloudflare / CAPTCHA / The Tor Project /  Inc / Facebookcorewwwi.onion

    Fact Sheet: Cloud Flare and the Tor Project What is the Tor Project? The Tor Project (TorProject.org) is a non-profit organization that develops and distributes free software to help millions of people defend against onl

    Add to Reading List

    Source URL: people.torproject.org

    Language: English - Date: 2016-03-31 13:39:58
    264Domain name system / Internet / Computing / Network architecture / DNS spoofing / Domain Name System Security Extensions / Name server / DNS zone / Pharming / Comparison of DNS server software / Google Public DNS

    DNS Threat Analysis Mark Santcroos∗, Olaf M. Kolkman†NLnet Labs www.nlnetlabs.nl NLnet Labs document 2006-SE-01 version 1.0 ∗

    Add to Reading List

    Source URL: www.nlnetlabs.nl

    Language: English - Date: 2009-06-27 06:06:52
    265Software / System software / Computer architecture / Energy conservation / Sleep mode / Shutdown / Booting / Gamepad / Computer mouse / Reset button / AV Security Suite

    TURNING THE POWER ON AND OFF SHARP AQUOS MONITOR DELL COMPUTER

    Add to Reading List

    Source URL: libraries.uark.edu

    Language: English - Date: 2016-02-29 16:35:50
    266Computing / Central processing unit / Computer architecture / Computer engineering / Cache / Instruction set / Opcode / Program counter / Computer / Tag / CPU cache

    Micro-Policies: Formally Verified Tagging Schemes for Safety and Security (Extended Abstract) C˘at˘alin Hrit¸cu (INRIA Paris)1 Today’s computer systems are distressingly insecure. A host of vulnerabilities arise fro

    Add to Reading List

    Source URL: software.imdea.org

    Language: English - Date: 2014-07-17 09:25:53
    267Computing / Internet / Domain name system / Network architecture / Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Unbound / Name server / Root name server

    Validating Caching Resolver Wouter Wijngaards (NLnet Labs) http://www.nlnetlabs.nl/ © May 2008 Stichting NLnet Labs

    Add to Reading List

    Source URL: www.unbound.net

    Language: English - Date: 2008-05-19 08:09:35
    268Identity management / Computer access control / EduGAIN / Cryptography / TERENA / Authentication / Computer security / Security

    Authentication and Authorisation for Research and Collaboration AARC Christos Kanellopoulos AARC Architecture WP Leader

    Add to Reading List

    Source URL: aarc-project.eu

    Language: English - Date: 2016-01-25 09:54:07
    269

    Whitepaper Egnyte Security Architecture A Comprehensive Approach to Security

    Add to Reading List

    Source URL: www.egnyte.com

    Language: English - Date: 2016-03-23 19:12:43
      270Computing / Internet / Domain name system / Network architecture / Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Name server / BIND / Unbound

      Dealing with fragmentation in EDNS0 Proposal for a recommendation Sean McAfee (AP) Roland van Rijswijk - Deij

      Add to Reading List

      Source URL: ripe65.ripe.net

      Language: English - Date: 2012-09-26 04:19:37
      UPDATE