Security architecture

Results: 5312



#Item
481Computing / Password / User / Computer network security / Extranet / Network architecture

C o mp o s i t e . Co mm u n i t y. E xt r a n e t - Us e r G u i d e CompositeComposite A/S Nygårdsvej 16 DK-2100 Copenhagen

Add to Reading List

Source URL: users.composite.net

Language: English - Date: 2015-01-23 03:53:06
482Computing / Network architecture / Network management / System administration / Domain name system / Domain Name System Security Extensions / Syslog / DNS zone transfer / Rsyslog / Internet protocols / Internet / Internet standards

DNS/DNSSEC Workshop Logging This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org). This document may be freely copied, modified, and otherwise re-used on the condition tha

Add to Reading List

Source URL: nsrc.org

Language: English - Date: 2015-02-17 16:20:56
483Network architecture / Internet protocols / Extensible Provisioning Protocol / Domain Name System Security Extensions / XML / Domain name / Internet Standard / Computing / Domain name system / Internet

draft-gieben-epp-keyrelay-02 - Key Relay Mapping for the Extensible Provisioning Protocol

Add to Reading List

Source URL: www.sidnlabs.nl

Language: English - Date: 2013-04-15 01:41:47
484Routing / Computer networking / Packet switching / Packet forwarding / Routing table / Forwarding plane / Packet Processing / Transmission Control Protocol / Router / Network architecture / Computing / Internet

Secure and Scalable Fault Localization under Dynamic Traffic Patterns

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2012-05-22 01:34:31
485Security / Bathing / Plumbing / Public toilets / Shower / Safe / Door / Japanese kitchen / Tap / Architecture / Rooms / Bathrooms

ncs_CSUlinear-Extension-black

Add to Reading List

Source URL: www.cdss.ca.gov

Language: English - Date: 2013-12-24 14:10:50
486Network architecture / Internet privacy / Internet protocols / Internet ethics / Computer network security / Tor / Domain name / Botnet / Domain name system / Internet / Computing

A Privacy framework for DNS big data 3 October 2014 Cristian Hesselman, Jelte Jansen, Maarten Wullink, Karin Vink en Maarten Simon

Add to Reading List

Source URL: www.sidnlabs.nl

Language: English - Date: 2014-11-04 04:48:17
487

Security Architecture TRUECRYPT-SPM030-ARC Central department of security and information systems Security Architecture

Add to Reading List

Source URL: www.ipa.go.jp

Language: Japanese - Date: 2014-07-11 01:13:39
    488System software / Computer architecture / Content-control software / Fortinet / Windows Server / Cryptographic protocols / Application firewall / Windows / IPsec / Computer network security / Computing / Tunneling protocols

    FortiClientTM Endpoint Security Application FortiClient is an all-in-one comprehensive security solution that extends the power of FortiGate’s unified threat management to endpoints on your network. Desktops, laptops,

    Add to Reading List

    Source URL: corex.at

    Language: English - Date: 2015-05-13 12:15:13
    489Computing / Internet protocols / Tunneling protocols / IPsec / IPv6 / Security association / Cryptographic protocols / Network architecture / Data

    WIDE Technical-Report inConfiguring IPsec for SHISA/MIPL wide-tr-nautilus6-configuring-ipsec-for-shisa-mipl-00.pdf WIDE Project : http://www.wide.ad.jp/

    Add to Reading List

    Source URL: member.wide.ad.jp

    Language: English - Date: 2006-06-21 07:42:40
    490Evaluation / Trusted computing base / Microkernel / L4 microkernel family / Real-time operating systems / Gernot Heiser / Formal verification / Isabelle / Formal methods / Computer security / Computer architecture / Computing

    Mathematically Verified Software Kernels: Raising the Bar for High Assurance Implementations Dr Daniel Potts, VP of Engineering, General Dynamics C4 Systems Rene Bourquin, Member Technical Staff, General Dynamics C4 Syst

    Add to Reading List

    Source URL: sel4.systems

    Language: English - Date: 2014-07-28 22:03:39
    UPDATE