Security architecture

Results: 5312



#Item
561Computing / Crypto-anarchism / Virtual private network / Gemalto / Computer security / Cyberwarfare / Computer network security / Internet privacy / Network architecture

Name of the Document Classification General Version 1.0

Add to Reading List

Source URL: vpn.nic.in

Language: English - Date: 2013-05-22 06:30:04
562Network architecture / Denial-of-service attacks / Internet standards / IP traceback / Denial-of-service attack / Router / IP address spoofing / TCP global synchronization / Computer network security / Computing / Internet

 The AuthorPublished by Oxford University Press on behalf of The British Computer Society. All rights reserved. For Permissions, please email: doi:comjnl/bxl026 An

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2006-06-27 09:05:07
563Real Estate Transaction Standard / Software architecture / Web application / Web development

RESO Web API Security Position and Business Case(s) Matthew McGuire – Senior Software Engineer, CoreLogic Summary

Add to Reading List

Source URL: reso.memberclicks.net

Language: English - Date: 2014-11-06 14:46:36
564Computer network security / Computer networking / Cyberwarfare / Data security / Firewall / Packet Processing / Network address translation / Netfilter / Traffic flow / Computing / Network architecture / System software

OpenNF: Enabling Innovation in Network Function Control Aaron Gember-Jacobson, Raajay Viswanathan, Chaithan Prakash, Robert Grandl, Junaid Khalid, Sourav Das, and Aditya Akella University of Wisconsin-Madison {agember,ra

Add to Reading List

Source URL: agember.com

Language: English - Date: 2014-06-16 13:51:13
565Computer network security / Telecommunications engineering / Voice over IP / Networking hardware / VoIP phone / Router / Quality of service / XO Communications / Virtual private network / Computing / Network architecture / Electronic engineering

High Availability Private Network (HAPN™) Network Upgrade Case Study Copyright 2013 – NetDiverse, LLC | www.netdiverse.com|

Add to Reading List

Source URL: www.netdiverse.com

Language: English - Date: 2013-04-10 13:59:32
566Computing / Internet / Network architecture / Transport Layer Security / Cipher suite / Telex / Proxy server / Transmission Control Protocol / HTTP Secure / Cryptographic protocols / Secure communication / Internet protocols

Telex: Anticensorship in the Network Infrastructure Eric Wustrow∗ ∗ The Scott Wolchok∗

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-07-18 09:40:53
567Enterprise architecture / Computing / Information Technology Infrastructure Library / Information technology management / Method engineering / Standards / Information security / Strategic management / Enterprise architect / Management / Data security / Security

SAM – INFORMATION TECHNOLOGY (California Department of Technology) Note: Effective January 1, 2008, the Office of Information Security (Office) restructured and renumbered the content and moved SAM Sections 4840 – 48

Add to Reading List

Source URL: www.documents.dgs.ca.gov

Language: English - Date: 2015-02-06 09:56:50
568Law of the sea / Naval architecture / Title 33 of the Code of Federal Regulations / International Regulations for Preventing Collisions at Sea / Public administration / Government / Sailing / Title 33 of the United States Code / Port and starboard / United States maritime law / Code of Federal Regulations / Transport

U.S. Department Of Homeland Security RECORD OF CHANGES CHANGE NUMBER

Add to Reading List

Source URL: www.calmseas.org

Language: English - Date: 2013-08-28 03:00:00
569Entertainment technology / Geography of Europe / Europe / Government / Trade fair / Berlin / Lighting

WORLD OF ENTERTAINMENT TECHNOLOGY TRADE SHOW AND CONFERENCE · BERLIN · 9 – 11 JUNE 2015 ARCHITECTURE / DESIGN · STAGE · LIGHTING · SOUND · VIDEO · MEDIA · EQUIPMENT · SECURITY WELCOME TO THE

Add to Reading List

Source URL: www.stage-set-scenery.de

Language: English - Date: 2013-07-26 05:01:31
570Computer network security / Videotelephony / Electronic engineering / Network protocols / Internet protocols / Session Initiation Protocol / Interactive Connectivity Establishment / STUN / Application-level gateway / Network architecture / Computing / Network Address Translation

Contributed article for IETF Journal Submitted by Cisco Final Draft – January 4, 2007 Interactive Connectivity Establishment: NAT Traversal for the Session Initiation Protocol

Add to Reading List

Source URL: www.jdrosen.net

Language: English - Date: 2013-12-14 12:44:18
UPDATE