Security architecture

Results: 5312



#Item
451Firewall / Computer security / Network security / IP address / Computing / Network architecture / Comparison of firewalls / Windows Firewall / Computer network security / Cyberwarfare / Data security

Registration Worksheet The following is required to register your product in the GTA Online Support Center (http://www.gta.com/support/center). Serial Number Activation Code

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2012-12-06 11:43:14
452Cryptographic protocols / Secure communication / Electronic commerce / Network architecture / Transport Layer Security / FTPS / HTTP Secure / Public key certificate / SSL-Explorer: Community Edition / Computing / Internet / Internet standards

SSL Browser & Client Remote Access Browser and Client Global Technology Associates provides a SSL remote access solution featuring both a Browser and a Client for secure network access. GTA SSL Key Features • Seamless

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2012-12-06 11:43:18
453Domain name system / Internet protocols / Internet standards / Computer network security / Denial-of-service attack / Internet Relay Chat / Network Time Protocol / NTP server misuse and abuse / Dynamic DNS / Internet / Computing / Network architecture

The Rising Tide: DDoS by Defective Designs and Defaults Richard Clayton University of Cambridge, Computer Laboratory, William Gates Building, 15 JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-06-07 17:31:37
454Community gardening / Metabolic rift / Allotment / Gardening / Agriculture / Sustainability / Food security / Urban agriculture / Environment / Landscape architecture

Urban Forum:447–461 DOIs12132Growing Communities: Integrating the Social and Economic Benefits of Urban Agriculture in Cape Town

Add to Reading List

Source URL: www.afsun.org

Language: English - Date: 2013-11-05 02:50:33
455Internet / Networking hardware / Cyberwarfare / Computer networking / Videotelephony / Router / Transmission Control Protocol / Firewall / Internet protocol suite / Computing / Computer network security / Network architecture

For Your Eyes Only: Protecting Data-in-Motion ™ with Dispersive Virtualized Networks

Add to Reading List

Source URL: dispersivetechnologies.com

Language: English - Date: 2015-04-29 15:03:25
456Internet / Network address translation / Middlebox / Application-level gateway / Internet Architecture Board / IP address / Port / Firewall / Transmission Control Protocol / Computer network security / Network architecture / Computing

Network Working Group Request for Comments: 3424 Category: Informational L. Daigle, Ed. Internet Architecture Board

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2002-11-18 13:47:46
457Internet protocols / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / DNS spoofing / Dan Kaminsky / Zone file / Internet / Domain name system / Network architecture

DNSSEC Introduction Principles Deployment This document is a result of work by the Network Startup Resource Center (NSRC at http://nsrc.org). This document may be freely copied, modified, and otherwise re-used on the con

Add to Reading List

Source URL: nsrc.org

Language: English - Date: 2015-02-17 17:22:37
458Cross-platform software / Java / CapDesk / Capability-based security / Sandbox / Computer security / Kernel / Computing / Software / System software

A Security Analysis of the Combex DarpaBrowser Architecture David Wagner Dean Tribble March 4, 2002 1 Introduction We describe the results of a limited-time evaluation of the security of the Combex DarpaBrowser, built on

Add to Reading List

Source URL: combex.com

Language: English - Date: 2005-08-18 16:59:47
459Android / Embedded Linux / Smartphones / Unix / Monolithic kernels / Ioctl / Kernel / System call / Operating system / Software / Computer architecture / System software

An Empirical Evaluation of the Android Security Framework? Alessandro Armando1,2 , Alessio Merlo1,3,?? , and Luca Verderame1 1 DIBRIS, Università degli Studi di Genova, Italy

Add to Reading List

Source URL: www.csec.it

Language: English - Date: 2014-08-26 05:32:51
460Evaluation / Computing / Security / Common Criteria / Crime prevention / Security Target / Smart card / Security service / Ring / ISO standards / Computer security / Computer network security

Supporting Document Guidance Security Architecture requirements (ADV_ARC) for smart cards and similar devices - Appendix 1

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2012-04-03 19:57:50
UPDATE