Security architecture

Results: 5312



#Item
281Computing / Backup / Data security / Computer file / DOS / Floppy disk / Disk formatting / Computer architecture / Software

I A PC DISK UTILITY UNPROTECTED

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English
282

Security Practices, Architecture and Technologies CONTACT: 36 S. Wall Street

Add to Reading List

Source URL: www.viewabill.com

Language: English - Date: 2016-02-26 08:42:30
    283

    NIST CYBERSECURITY PRACTICE GUIDE ENERGY IDENTITY AND ACCESS MANAGEMENT FOR ELECTRIC UTILITIES Approach, Architecture, and Security Characteristics

    Add to Reading List

    Source URL: nccoe.nist.gov

    Language: English - Date: 2015-09-09 10:14:20
      284

      MYSEA: The Monterey Security Architecture Cynthia E. Irvine, Thuy D. Nguyen, David J. Shifflett, Timothy E. Levin, Jean Khosalim, Charles Prince, Paul C. Clark and Mark Gondree Department of Computer Science, Naval Postg

      Add to Reading List

      Source URL: cisr.nps.edu

      Language: English - Date: 2010-03-24 14:46:06
        285

        Monterey Security Enhanced Architecture Project Cynthia Irvine, David Shifflett, Paul Clark, Timothy Levin, George Dinolt Naval Postgraduate School Abstract This research project has produced an innovative

        Add to Reading List

        Source URL: www.cisr.us

        Language: English - Date: 2007-11-15 12:21:10
          286Domain name system / Computing / Internet / Network architecture / OpenDNS / Domain Name System Security Extensions / Name server / Root name server / DNS spoofing / Proxy server / Reverse DNS lookup / Extension mechanisms for DNS

          Implications of Netalyzr’s DNS Measurements Nicholas Weaver Christian Kreibich Boris Nechaev

          Add to Reading List

          Source URL: www1.icsi.berkeley.edu

          Language: English - Date: 2012-09-26 16:43:04
          287

          Enforcing Conformance between Security Architecture and Implementation Marwan Abi-Antoun Jeffrey M. Barnes

          Add to Reading List

          Source URL: reports-archive.adm.cs.cmu.edu

          Language: English - Date: 2009-04-24 17:44:53
            288Computer network security / Virtual private networks / Crypto-anarchism / Internet privacy / Network architecture / Modem

            STEPS TO CONFIGURE VPNoBB IN LINUX

            Add to Reading List

            Source URL: hcraj.nic.in

            Language: English - Date: 2012-09-10 07:44:12
            289IEEE 802 / OSI protocols / Computer networking / Units of information / Network architecture / PHY / OSI model / Network packet / Frame / IEEE 802.15 / ZigBee / Transmission Control Protocol

            Phantom Boundaries and Cross-layer Illusions inDigital Radio (Research Report) Travis Goodspeed Straw Hat Security

            Add to Reading List

            Source URL: spw14.langsec.org

            Language: English - Date: 2014-06-12 23:25:59
            290Computing / Internet / Network architecture / Network protocols / BID / Transport Layer Security / Comparison of data serialization formats

            Netfonds Bank AS API Gateway Version 1.3 Pia Jakobsen 

            Add to Reading List

            Source URL: www.netfonds.no

            Language: English
            UPDATE