Security architecture

Results: 5312



#Item
591Software / Data compression / Data deduplication / Data management / Backup / ExaGrid / Disk staging / Off-site data protection / Computer data storage / Computing / Backup software / Data security

How Backup Disk Architecture Impacts the Backup Window How Backup Disk Architecture Impacts the BU Window-Handout-2

Add to Reading List

Source URL: www.exagrid.com

Language: English - Date: 2014-06-15 13:36:21
592Socioeconomics / Social security / Welfare state / Government / Sociology / Caledon Institute of Social Policy / Welfare / Unemployment benefits / Social policy / Welfare economics / Social programs / Taxation in the United States

Towards a New Architecture for Canada’s Adult Benefits by Ken Battle, Michael Mendelson and Sherri Torjman

Add to Reading List

Source URL: www.caledoninst.org

Language: English - Date: 2006-06-14 09:43:14
593Information technology management / Method engineering / Standards / Business continuity / Computer security / Data security

Agency DOIT EA REQUEST for Project Architecture Review 2 DoIT Enterprise Architecture

Add to Reading List

Source URL: www.doit.state.nm.us

Language: English - Date: 2013-12-24 10:50:55
594OSI protocols / Ethernet / Content-control software / Fortinet / QSFP / Virtual private network / 10 Gigabit Ethernet / IPsec / Network security / Computing / Network architecture / Computer network security

DATA SHEET FortiGate® 3700DX High Performance Data Center Firewall FortiGate 3700DX

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:15:09
595Smartphones / Cloud clients / Computing / Software / Mac OS X / IOS / Xbox 360 system software / Copyright law / Digital rights management / Computer architecture

How to Modify the System Software for Developer 1. Introduction Due to security reasons, the debug function for the MOVERIO BT-200 system software for consumer is disabled. We have special system software with debug func

Add to Reading List

Source URL: tech.moverio.epson.biz

Language: English - Date: 2015-03-24 21:56:43
596Network protocols / Computer network security / Crypto-anarchism / Internet privacy / Virtual private network / Broadview Networks / MPLS VPN / Private IP / Network architecture / Computer architecture / Computing

800 Westchester Ave. Suite N-501 Rye Brook, NY2200 Product-Specific Terms & Conditions

Add to Reading List

Source URL: corporate.broadviewnet.com

Language: English - Date: 2014-11-05 14:29:55
597Multics / Operating system / Unix / Ring / B / Kernel / Linux kernel / System Development Corporation / Capability-based security / Computer architecture / System software / Software

NRL ReportBest Available Technologies (BATs) for Computer Security CARL

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:59:16
598Internet / Akamai Technologies / Denial-of-service attack / Network architecture / Speedera Networks / Denial-of-service attacks / Prolexic Technologies / Computing

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Prolexic Routed DDoS defense for protecting data center infrastructures against large, complex attacks Organizations increasingly interact with customers, employees and pa

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2014-07-18 11:24:01
599Internet protocols / Data / Network architecture / IPsec / Virtual private network / Computing / Computer network security / Cryptographic protocols

E-1000x The Network Box E-1000x is a member of the Network Box S-M-E product range. This model is the current flagship of the Network Box range of security appliances. Designed from the outset for the Enterprise marketp

Add to Reading List

Source URL: www.cmssoft.co.uk

Language: English - Date: 2015-04-01 11:10:38
600Markup languages / Software architecture / Web development / JavaScript / XMLHttpRequest / HTML5 / Web application / Cross-site scripting / Cross-Origin Resource Sharing / Computing / World Wide Web / Ajax

A Security Analysis of Emerging Web Standards HTML5 and Friends, from Specification to Implementation Philippe De Ryck, Lieven Desmet, Frank Piessens and Wouter Joosen IBBT-DistriNet, KU Leuven, 3001 Leuven, Belgium {fir

Add to Reading List

Source URL: lirias.kuleuven.be

Language: English
UPDATE