Security architecture

Results: 5312



#Item
361Computing / Ethernet / Security / Network architecture / Network protocols / Configuration management / Software-defined networking / OpenFlow / Computer network / Network switch / Routing / Computer security

PDF Document

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:11
362Network performance / Computing / Computer architecture / Software / Network socket / Network congestion / TCP congestion control / Transmission Control Protocol / Tor / Packet loss / Linux kernel / Scheduling

PDF Document

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2014-10-09 10:44:05
363Software / User interface techniques / Computing / System software / Web development / Software architecture / Web application / Browser security / Form / World Wide Web / Sandbox

PDF Document

Add to Reading List

Source URL: amitlevy.com

Language: English - Date: 2012-11-15 17:46:54
364Computing / Emerging technologies / Network architecture / Computer architecture / Configuration management / Software-defined networking / OpenFlow / Routing / Node / Peer-to-peer

PDF Document

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2014-05-02 15:52:05
365Software / System software / Computer architecture / SUSE Linux / YaST / Ncurses / Installation / SUSE Linux distributions / Yet another / Btrfs / Security-Enhanced Linux / OpenSUSE

PDF Document

Add to Reading List

Source URL: www.suse.com

Language: English
366

Demystifying Java Platform Security Architecture Ramesh Nagappan, CISSP www.coresecuritypatterns.com

Add to Reading List

Source URL: www.coresecuritypatterns.com

Language: English - Date: 2012-10-30 14:48:56
    367

    WHITE PAPER > LOWERING MSP TCO ENDPOINT SECURITY SOLUTIONS Lowering MSP TCO for Endpoint Security Solutions Bottom-Line Benefits of Cloud-Based Antivirus Architecture JANUARY 2014

    Add to Reading List

    Source URL: www.webroot.com

    Language: English - Date: 2015-06-02 14:16:38
      368Computer architecture / Internet privacy / Network architecture / Cisco Systems VPN Client / Virtual private network / Windows / Shared resource / UT-VPN / Check Point VPN-1 / Computer network security / Computing / Tunneling protocols

      AccessTUE Version 1.20, AccessTUE Easy access to TU/e resources

      Add to Reading List

      Source URL: ba.ieis.tue.nl

      Language: English - Date: 2013-04-18 07:13:10
      369Financial institutions / Institutional investors / Financial economics / Naval architecture / Protection and indemnity insurance / International relations / Admiralty law / Insurance / Maritime Labour Convention / Transport / Types of insurance / International law

      Standard Bulletin Setting the Standard for Service and Security Club News

      Add to Reading List

      Source URL: www.standard-club.com

      Language: English - Date: 2013-06-07 10:02:00
      370Denial-of-service attacks / Routing / Distributed computing architecture / Network architecture / Overlay network / Denial-of-service attack / Null route / Router / Botnet / Computing / Concurrent computing / Computer network security

      Denial of Service Attacks and Resilient Overlay Networks Angelos D. Keromytis Network Security Lab Computer Science Department, Columbia University

      Add to Reading List

      Source URL: www.nis-summer-school.eu

      Language: English - Date: 2008-10-20 04:40:05
      UPDATE