Security architecture

Results: 5312



#Item
491Internet / Routing protocols / Denial-of-service attacks / IP traceback / Denial-of-service attack / Router / IP address spoofing / Traffic flow / Protocol Independent Multicast / Computing / Network architecture / Computer network security

You Can Run, But You Can’t Hide: An Effective Methodology to Traceback DDoS Attackers K.T. Law Department of Computer Science & Engineering The Chinese University of

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2004-06-10 15:32:10
492Software testing / Computer network security / Crime prevention / Electronic commerce / National security / Vulnerability / Dependability / Software architecture / Ring / Computing / Security / Computer security

Dependability Research Group Jack Davidson Professor

Add to Reading List

Source URL: www.seas.virginia.edu

Language: English - Date: 2013-07-22 09:14:44
493Military science / Command and control / Department of Defense Architecture Framework / Net-centric / Security controls / Defense Information Systems Agency / Information assurance / Global Information Grid / Defense Technical Information Center / Computer security / United States Department of Defense / Security

DoD Instruction, May 8, 2015

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2015-05-08 17:02:47
494Green roof / Home / Food security / Environment / Architecture / Urban agriculture

SPONSORED BY: 2 Grey to Green Conference – To register now, click: http://www.cvent.com/d/5rqk29/4W AGENDA AT A GLANCE

Add to Reading List

Source URL: www.greytogreenconference.org

Language: English - Date: 2015-05-28 10:23:20
495Physical geography / Construction / Flood control / Flood opening / Hydrology / Elevation / Puerto Rico / Architecture / Geography / Building engineering

ELEVATION CERTI FICATE u.s. DEPARTMENT OF HOMELAND SECURITY ""Feooral Errrergency Management Agency

Add to Reading List

Source URL: www.townofredingtonshores.com

Language: English - Date: 2011-08-25 14:38:35
496Windows Server / Computer architecture / Windows XP editions / Data security / Windows / Microsoft Windows / Windows XP / Software

Wave Discoverer Locate and Map Sensitive Data Protector – block or encrypt data transferred to external media and devices (CD/DVD, USB, Firewire, etc.) and block

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:08:58
497Data / Internet protocols / Network protocols / Computer network security / Tunneling protocols / IPsec / Internet Key Exchange / Optical Internetworking Forum / IPv6 / Network architecture / Computing / Cryptographic protocols

IA OIF-SEPSecurity Extension for UNI and E-NNI 2.1 IA # OIF-SEP-03.2 October 8, 2012

Add to Reading List

Source URL: www.oiforum.com

Language: English - Date: 2012-11-02 14:48:42
498Cyberwarfare / Firewall / Internet security / Network security / Transmission Control Protocol / Deep packet inspection / Network address translation / Internet protocol suite / SCADA / Computer network security / Computing / Network architecture

2011 BlackRidge Technology Transport Access Control: Overview

Add to Reading List

Source URL: blackridge.us

Language: English - Date: 2012-07-25 14:33:36
499Healthcare in the United States / Computer network security / Internet privacy / Network architecture / Health Insurance Portability and Accountability Act / Medicare / Virtual private network / Hospice / Medicine / Palliative medicine / Health

CASE STUDY AMERICAN HOSPICE SALVAGES MOBILE HEALTH INITIATIVE WITH NCP’S HELP

Add to Reading List

Source URL: www.ncp-e.com

Language: English - Date: 2014-10-24 06:18:29
500Computer network security / Computer networking / Network performance / Deep packet inspection / Session border controller / Proxy server / Communications protocol / Network address translation / Firewall / Computing / Network architecture / Internet

White Paper Service Chaining in Carrier Networks Prepared by

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-03-31 11:09:25
UPDATE