Security architecture

Results: 5312



#Item
411Community building / Food politics / Landscape architecture / Community-based organizations / Environmental design / Food security / Oakland /  California / Agriculture / Community gardening / Urban agriculture / Environment / Geography of California

Black and Brown Urban Agriculture Oakland Convening – 2015 Black Urban Farmers and Gardeners Conference – 2015 October 15 – 18, 2015 Oakland, CA

Add to Reading List

Source URL: blackurbangrowers.org

Language: English - Date: 2015-04-29 23:58:22
412Pcap / Tcpdump / Wireshark / Network Driver Interface Specification / Firewall / Packet capture / Architecture of Windows NT / Transmission Control Protocol / Kernel / Software / Computer network security / Berkeley Packet Filter

An Architecture for High Performance Network Analysis Fulvio Risso and Loris Degioanni Dipartimento di Automatica e Informatica – Politecnico di Torino Corso Duca degli Abruzzi, 24 – 10129 Torino, Italy {risso,degio

Add to Reading List

Source URL: www.winpcap.org

Language: English - Date: 2010-09-05 10:10:56
413Network architecture / Computer network security / Internet privacy / Internet protocols / Hacking / DNS hijacking / Name server / Proxy server / Botnet / Internet / Computing / Domain name system

Operation Ghost Click: The Rove Digital Takedown

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2012-07-02 22:28:05
414Network architecture / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Hardware security module / Name server / DS / Domain name system / Internet / Internet protocols

DNSSEC_Policy_nic.at_v1.0_2012

Add to Reading List

Source URL: www.nic.at

Language: English - Date: 2012-02-27 09:48:43
415Electronics / Videotelephony / Network protocols / Computer network security / Voice over IP / Session Initiation Protocol / STUN / Proxy server / Traversal Using Relays around NAT / Network architecture / Computing / Network Address Translation

Creating your own service profile for SJphone™ © SJ Labs, IncAll rights reserved SJphone is a registered trademark. No part of this document may be copied, altered, or transferred to, any other media without w

Add to Reading List

Source URL: www.sjphone.org

Language: English - Date: 2006-07-26 14:36:30
416Network architecture / Internet / Computer network security / RADIUS / Directory services / IP address / Lightweight Directory Access Protocol / Internet protocols / Internet standards / Computing

yubico cococo NetMotion + YubiRADIUS Quick Start Guide

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2015-04-06 10:17:03
417Internet privacy / Network architecture / Computer architecture / Crypto-anarchism / Virtual private network / Point-to-Point Tunneling Protocol / UT-VPN / Computer network security / Computing / Tunneling protocols

How to #12-01 Version 1.0, How to: Set up a TU/e VPN connection on an iPad

Add to Reading List

Source URL: ba.ieis.tue.nl

Language: English - Date: 2012-02-22 10:01:16
418Computer network security / Internet protocols / Virtual private networks / Tunneling protocols / OpenVPN / Internet standards / IPv6 / Internet protocol suite / Router / Computing / Network architecture / Internet

Technical Specification – Page 1 Firmware-Extensions Software Package for Routers You can find the software packages pre- configured and compiled in the Flash-Memory of our routers ERT100 and MRT150N. Of course these

Add to Reading List

Source URL: www.lyconsys.com

Language: English - Date: 2012-10-29 08:15:31
419Embedded Linux / Smartphones / Windows NT architecture / Cross-platform software / Android / Mandatory access control / Architecture of Windows NT / Kernel / Linux Security Modules / Computing / Software / Computer architecture

Poster: Full Support for Reference Monitoring in Android’s Application Framework Michael Backes Sven Bugiel

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:32
420Malware / Kernel / Linux kernel / Portable Executable / Software / System software / Computer architecture

Poster: Classifying Downloaders Yu Ding1 , Liang Guo3 ,Chao Zhang2 , Yulong Zhang2 , Hui Xue2 , Tao Wei2 , Yuan Zhou3 , Xinhui Han1 Peking University1 , UC Berkeley2 , Beihang University3 {dingelish,greenpear1991,gausszh

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:25
UPDATE