Security architecture

Results: 5312



#Item
531Dormitory / Fire protection / Residence hall director / Williamson Hall / Architecture / Fire alarm system / Fire safety

Microsoft Word - ISU 2013 HEOA Report

Add to Reading List

Source URL: security.illinoisstate.edu

Language: English - Date: 2014-10-01 12:35:59
532Cyberwarfare / Firewall / Internet security / Network security / Transmission Control Protocol / Deep packet inspection / Network address translation / Internet protocol suite / SCADA / Computer network security / Computing / Network architecture

BLACKRIDGE TECHNOLOGY Transport Access Control: Overview 1

Add to Reading List

Source URL: blackridge.us

Language: English - Date: 2014-01-24 18:54:20
533Fortinet / Network architecture / Tunneling protocols / Data / International Computer Security Association / Network switch / IPsec / Computer network security / Computing / Content-control software

DATA SHEET FortiGate® 800C Accelerated Security for Mid-Sized Enterprise and Large Branch Offices

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:15:14
534Real-time operating systems / Monolithic kernels / Microkernel / Kernel / Ioctl / Android / Operating system / EROS / Loadable kernel module / Computer architecture / System software / Software

Verifying Security Invariants in ExpressOS Haohui Mai Edgar Pek Hui Xue Samuel T. King P. Madhusudan

Add to Reading List

Source URL: haohui.me

Language: English
535Rooms / Flood control / Hydrology / Building engineering / National Flood Insurance Program / United States Department of Homeland Security / Floodplain / Flood insurance / Parking / Architecture / Water / Physical geography

Below-Grade Parking Requirements for Buildings Located in Special Flood Hazard Areas in accordance with the National Flood Insurance Program

Add to Reading List

Source URL: delawarecity.delaware.gov

Language: English - Date: 2015-02-02 13:20:20
536Computer security / Electronic commerce / Application firewall / DMZ / Software testing / DevOps / Cloud computing / Application security / Web application security / Computer network security / Computing / Cyberwarfare

Guarding Your Web Systems CLOUD-DMZ ™ Web APPLICATION Security A NEW, CLOUD-BASED ARCHITECTURE

Add to Reading List

Source URL: www.sentrix.com

Language: English - Date: 2015-05-19 11:36:28
537Internet / Proxy server / Malware / Denial-of-service attack / Botnet / Moose / Server / Router / NAT traversal / Computer network security / Computing / Network architecture

Dissecting Linux/Moose The Analysis of a Linux Router-based Worm Hungry for Social Networks Olivier Bilodeau

Add to Reading List

Source URL: www.welivesecurity.com

Language: English - Date: 2015-05-22 12:40:42
538Computing / Crypto-anarchism / Virtual private network / Cyberwarfare / Computer architecture / Tunneling protocols / Computer network security / Network architecture / Internet privacy

Guidelines for renewal of VPN account 1. VPN team is mailing prefilled VPN application as per existing information available and sending the auto generated pdf to the user with copy to the respective NIC coordinator atl

Add to Reading List

Source URL: vpn.nic.in

Language: English - Date: 2015-02-06 04:34:51
539Fortinet / Network architecture / Tunneling protocols / Data / International Computer Security Association / Network switch / IPsec / Computer network security / Computing / Content-control software

DATA SHEET FortiGate® 800C Accelerated Security for Mid-Sized Enterprise and Large Branch Offices

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:15:14
540Building engineering / Technology / Computer-aided design / Data modeling / Emergency evacuation / Systems engineering / Simulation / Building management system / ISO 10303 / Building information modeling / Construction / Architecture

3 Safety and security Scenarios The scope of the project is to create a resilient building complex, not only

Add to Reading List

Source URL: www.elasstic.eu

Language: English - Date: 2014-12-11 09:48:09
UPDATE