Security architecture

Results: 5312



#Item
461ISO standards / Crime prevention / National security / Computing / Security Target / Security service / Ring / Common Criteria / Computer security / Computer network security / Security

Security Architecture requirements (ADV_ARC) for smart cards and similar devices Appendix 1 Version 2.0 January 2012

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2013-02-14 10:21:06
462Environmental social science / Climate change policy / Sustainable architecture / Sustainable building / Paul Ekins / Economics of global warming / Sustainable development / Environment / Environmental economics / Sustainability

Resource Productivity, Environmental Tax Reform and Sustainable Growth in Europe Environmental tax reform (ETR) is a shift in the target of taxation from ‘goods’ such as labour (e.g. income taxes, social security co

Add to Reading List

Source URL: www.petre.org.uk

Language: English - Date: 2011-08-30 09:50:26
463Network address translation / Computer network security / TCP/IP stack fingerprinting / IPv4 / IP address / Private network / Transmission Control Protocol / Network protocols / Network architecture / Internet / Computing

2014 IEEE Security and Privacy Workshops Can we identify NAT behavior by analyzing Traffic Flows? YaseminGokcen

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-30 03:11:08
464X86 assembly language / Accumulator / Transmission Control Protocol / X86-64 / Checksum / MOV / Ping / X86 / Spinlock / Computer architecture / Computing / X86 architecture

New Results for Timing-Based Attestation

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2012-05-22 01:34:12
465Trusted computing / Virtual machines / Trusted Execution Technology / x86 architecture / Trusted Computing Group / Trusted Platform Module / Xen / Dell PowerEdge / Embedded hypervisor / System software / Computing / Software

Cloud Design Uses Enomaly ECP* for Platform Security

Add to Reading List

Source URL: www.intel.com

Language: English - Date: 2014-03-01 18:42:02
466Architecture / English grammar / Shall and will / Submittals / Electrical conduit / Access control / Construction / Security / Electrical wiring

Lenel On-Guard: Security System Installation and Wiring Standards GENERAL TERMS The Contractor shall add all access control System LENEL controllers LNL 2220, LNL 1320, LNL 1100 Multi Technology readers, and associated e

Add to Reading List

Source URL: www.longwood.edu

Language: English - Date: 2011-09-28 17:13:21
467Computer network security / Internet privacy / Network architecture / Help desk / Password / Wi-Fi / Moodle / Virtual private network / Eduroam / Software / Educational software / Computing

Vienna University Computer Center Zentraler Informatikdienst = ZID Information and Communication Technology for University Melina Tsiamos

Add to Reading List

Source URL: doktorat.univie.ac.at

Language: English - Date: 2015-03-06 04:11:23
468Technology / Trusted computing / Telemetry / Network architecture / Trusted Network Connect / IF-MAP / SCADA / Control system security / Trusted Computing Group / Computer security / Computer network security / Computing

ARCHITECT’S GUIDE: ICS SECURITY USING TNC TECHNOLOGY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2013-11-06 16:49:30
469

The Security Architecture of the Chromium Browser Adam Barth∗ Collin Jackson∗ UC Berkeley

Add to Reading List

Source URL: www.adambarth.com

Language: English - Date: 2009-09-29 15:07:10
    470Network architecture / Virtual private network / Computing / Computer network security / Crypto-anarchism / Internet privacy

    VPN VEJLEDNING TIL IOS IOS 7 1

    Add to Reading List

    Source URL: medarbejdere.au.dk

    Language: English - Date: 2014-09-23 03:23:49
    UPDATE