Security architecture

Results: 5312



#Item
311

Attribute Based Access Control Approach, Architecture, and Security Characteristics NIST SPECIAL PUBLICATION 1800-3b

Add to Reading List

Source URL: nccoe.nist.gov

Language: English - Date: 2016-01-19 13:05:35
    312Computing / Network architecture / Computer architecture / Virtual private networks / Computer network security / Internet privacy / Crypto-anarchism / Quality of service / Differentiated services / SoftEther VPN / Mobile virtual private network

    Microsoft Word - Dokument2

    Add to Reading List

    Source URL: www.kutter-fonds.ethz.ch

    Language: English - Date: 2010-05-16 10:11:22
    313Computing / Virtual private networks / Computer network security / Network architecture / Tunneling protocols / Layer 2 Tunneling Protocol / Point-to-Point Tunneling Protocol / SoftEther VPN / OpenVPN

    ITServ Request for VPN Access Every field is mandatory Name: ______________________________________ ID. ___________ Tel. ___________ School/Department/Unit: _________________________Email: _____________________ Period Re

    Add to Reading List

    Source URL: itserv.ait.ac.th

    Language: English - Date: 2012-10-23 04:58:00
    314Computing / Internet / Network architecture / Internet Standards / Internet protocols / Network protocols / Network booting / Dynamic Host Configuration Protocol / Network service / Universal Plug and Play / Proxy Mobile IPv6 / Transport Layer Security

    Defensics_TechSheet_LATEST_25Sept14.indd

    Add to Reading List

    Source URL: www.codenomicon.com

    Language: English - Date: 2016-03-02 04:58:12
    315Computing / Cryptography / IPsec / Network architecture / Cryptographic protocols / Virtual private networks / Computer network security / Cryptographic software / StrongSwan / Internet Key Exchange / FreeS/WAN / Openswan

    LinuxTag 2010 Berlin strongSwan News Prof. Dr. Andreas Steffen Martin Willi

    Add to Reading List

    Source URL: www.strongswan.org

    Language: English - Date: 2010-06-11 06:38:12
    316

    NIST CYBERSECURITY PRACTICE GUIDE HEALTH IT SECURING ELECTRONIC HEALTH RECORDS ON MOBILE DEVICES Approach, Architecture, and Security Characteristics

    Add to Reading List

    Source URL: nccoe.nist.gov

    Language: English - Date: 2015-07-23 13:55:15
      317Computing / Software engineering / Software architecture / Web 2.0 / Computer network security / Web development / Web programming / JavaScript / Cross-site scripting / Web framework / World Wide Web / Rich Internet application

      Report from Dagstuhl SeminarWeb Application Security Edited by Lieven Desmet1 , Martin Johns2 , Benjamin Livshits3 , and

      Add to Reading List

      Source URL: drops.dagstuhl.de

      Language: English - Date: 2013-02-18 02:32:49
      318Computing / Computer architecture / Technology / Stratus Technologies / Windows Server / Microsoft Windows / Microsoft / Orlando International Airport / Computer security

      Software Solution Case Study |

      Add to Reading List

      Source URL: www.stratus.com

      Language: English - Date: 2015-01-23 05:53:46
      319

      2015 IEEE CS Security and Privacy Workshops Nom, a byte oriented, streaming, zero copy, parser combinators library in Rust Geoffoy Couprie Software Security & Architecture Consultant

      Add to Reading List

      Source URL: spw15.langsec.org

      Language: English - Date: 2015-05-21 16:43:35
        320

        Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms BalkanCryptSec 2014 Istanbul, October 16, 2014

        Add to Reading List

        Source URL: www.gstl.itu.edu.tr

        Language: English - Date: 2014-10-18 19:44:19
          UPDATE