Security architecture

Results: 5312



#Item
511Deep packet inspection / Virtual machines / Packet Processing / X86 virtualization / OpenFlow / Network intelligence / Hyper-V / Xen / System software / Software / Computer network security

WHITE PAPER Intel® Architecture Processors Qosmos* DPI Technology Networking and Communications Service-Aware Network Architecture Based on

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-03-31 11:07:48
512Rooms / Flood control / Hydrology / Building engineering / National Flood Insurance Program / United States Department of Homeland Security / Floodplain / Flood insurance / Parking / Architecture / Water / Physical geography

Below-Grade Parking Requirements for Buildings Located in Special Flood Hazard Areas in accordance with the National Flood Insurance Program

Add to Reading List

Source URL: delawarecity.delaware.gov

Language: English - Date: 2015-02-02 13:21:36
513System software / Computer architecture / Content-control software / Fortinet / Windows Server / Cryptographic protocols / Application firewall / Windows / IPsec / Computer network security / Computing / Tunneling protocols

FortiClientTM Endpoint Security Application FortiClient is an all-in-one comprehensive security solution that extends the power of FortiGate’s unified threat management to endpoints on your network. Desktops, laptops,

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:15:13
514Streaming / Computer network security / Network architecture / Electronic engineering / Deep packet inspection / Policy charging and rules function / Traffic shaping / Quality of service / Traffic flow / Computing / Telecommunications engineering / Network performance

Application Note Intel® Architecture Processors Qosmos* DPI Technology Policy Enforcement in SDN and NFV- based Telco Infrastructure

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-03-31 11:07:29
515Network architecture / Electronics / Quality of service / Network intelligence / System Architecture Evolution / Network processor / Continuous Computing / Deep packet inspection / Computer network security / Computing

Product Brief Qosmos ixEngine®: Policy Control and Charging (PCC) Use Case For developers of telecom equipment who want to build products to handle the growth of mobile data traffic, provide

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-03-31 11:09:08
516Backup / Data security / AppleScript / RAID / Computer icon / Windows / Computing / Computer architecture / Software

Mac/Win v1.0 February 8, 2013 Contents Double Data System Requirements Apple Macintosh version

Add to Reading List

Source URL: www.doubledata.biz

Language: English - Date: 2013-02-08 06:44:57
517Business / Webroot Software / Avira / Malware / Managed services / Webroot Internet Security Complete / Antivirus software / System software / Software

WHITE PAPER > LOWERING MSP TCO ENDPOINT SECURITY SOLUTIONS Lowering MSP TCO for Endpoint Security Solutions Bottom-Line Benefits of Cloud-Based Antivirus Architecture JANUARY 2014

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2015-03-30 12:52:54
518Network architecture / Content-control software / Fortinet / Tunneling protocols / Networking hardware / Virtual private network / Network security / Network switch / IPsec / Computer network security / Computing / Ethernet

DATA SHEET FortiGate® 70D Series Security Gateway for Distributed Branch Offices

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:09:23
519Debian / Validation / Computer architecture / Cloud computing / Software / Free software

    FedRAMP Compliance All Federal agencies must use the FedRAMP process for doing security assessments, authorizations, and continuous monitoring of cloud services. Agencies must validate

Add to Reading List

Source URL: www.fedramp.gov

Language: English - Date: 2015-05-21 14:42:28
520JavaScript / Scripting languages / Software architecture / Portable software / Cross-site request forgery / HTTP cookie / Mashup / Cross-site scripting / Google Chrome / Software / Computing / Web development

Toward Principled Browser Security Edward Z. Yang1 Deian Stefan1 John Mitchell1 David Mazi`eres1 Petr Marchenko2 Brad Karp2 1 Stanford University 2 University College London A BSTRACT To ensure the confidentiality and in

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-12-02 06:10:56
UPDATE