Security architecture

Results: 5312



#Item
381Human–computer interaction / Visual arts / Usability / Web development / Software architecture / User interface design / Telogis Inc. / User experience design / Web application / Design / Web design / Software development

CV for Nathanael Coyne Personal Details Name: Mr Nathanael Coyne (Boehm) Date of Birth: 18 July 1983 Citizenship: Australian Security Clearance: Lapsed

Add to Reading List

Source URL: www.purecaffeine.com

Language: English - Date: 2015-05-01 01:07:12
382Network architecture / Domain Name System Security Extensions / DNS spoofing / Name server / Root name server / Extension mechanisms for DNS / Denial-of-service attack / Anycast / Load balancing / Internet / Computing / Domain name system

Fragmentation Considered Poisonous arXiv:1205.4011v1 [cs.CR] 17 May 2012 Amir Herzberg† and Haya Shulman‡ Dept. of Computer Science, Bar Ilan University

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2012-05-23 11:56:51
383

Joint Interpretation Library Security Architecture requirements (ADV_ARC) for smart cards and similar devices Document purpose: provide requirements to developers and guidance to evaluators to fulfill

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2013-02-14 10:20:43
    384Peace and conflict studies / Political science / Swisspeace / Peacebuilding / Security sector reform / Peace journalism / Alliance for Peacebuilding / Environmental peacebuilding / Peace / Peacekeeping / International relations

    KOFF Newsletter No. 138, June 2015 Swiss Peacebuilding Architecture

    Add to Reading List

    Source URL: www.swisspeace.ch

    Language: English - Date: 2015-06-01 11:13:06
    385Network architecture / Firewall / Telnet / Computer security / Application firewall / Computer network security / Computing / Internet

    Adventures in Hackery Matt Bishop Department of Computer Science University of California at Davis Davis, CAphone: (

    Add to Reading List

    Source URL: seclab.cs.ucdavis.edu

    Language: English - Date: 2004-06-21 18:55:45
    386Internet / Network Address Translation / Network protocols / Cisco PIX / Server appliance / Private network / Traversal Using Relays around NAT / IP address / Nat / Network architecture / Computer network security / Computing

    v45n2n2-francis_v45n1a1-sommers.qxd

    Add to Reading List

    Source URL: www.sigcomm.org

    Language: English - Date: 2015-06-08 16:59:49
    387Computer network security / IEEE 802 / Computer networking / Packet Processing / Deep packet inspection / Quality of service / Cloud computing / WiMAX / System Architecture Evolution / System software / Computing / Electronic engineering

    White Paper Virtualisation in Telecoms Networks Intel® Architecture Processors Networking and Communications Realising the Benefits of Network

    Add to Reading List

    Source URL: www.intel.it

    Language: English - Date: 2014-03-04 14:05:00
    388Construction / Architecture / Fluid mechanics / Hose / Valve / Piping and plumbing fittings / Recreational vehicle / Hose coupling / Hose clamp / Plumbing / Piping / Water industry

    Security gas hoses are determinated to connect to the fitting type 657 or UK. By their construction they secure easy, quick and safety connection and disconnection from the gas appliance. The fitting serves as the seal o

    Add to Reading List

    Source URL: www.az-flowtech.com

    Language: English - Date: 2005-04-08 06:52:15
    389Technology / Computing / Nanonetwork / Network architecture / Telecommunications / Key management / Public-key cryptography / Cryptography / Nanorobotics / Software / Nanotechnology / Emerging technologies

    Towards Security in Nano-communication: Challenges and Opportunities Falko Dressler∗,a , Frank Karglb,c a Computer and Communication Systems, University of Innsbruck, Austria b Distributed Systems, University of Ulm, G

    Add to Reading List

    Source URL: eprints.eemcs.utwente.nl

    Language: English - Date: 2013-01-06 11:36:19
    390Routing protocols / Routing / Internet protocols / Internet standards / Computer networking / Border Gateway Protocol / IP hijacking / Router / Path vector protocol / Network architecture / Computing / Internet

    1 A Survey of BGP Security Issues and Solutions Kevin Butler, Toni Farley, Patrick McDaniel, and Jennifer Rexford Abstract

    Add to Reading List

    Source URL: www.cs.princeton.edu

    Language: English - Date: 2008-09-21 13:02:46
    UPDATE