Security architecture

Results: 5312



#Item
601Computer security / IPsec / Stateful firewall / Computer network security / Computing / Network architecture

S-85 The Network Box S-85 is a member of the Network Box S-M-E product range. The S-85 is aimed at small offices that require UTM+ services, including content filtering and protection against malware. This model include

Add to Reading List

Source URL: www.cmssoft.co.uk

Language: English - Date: 2015-04-01 11:10:40
602Computer security / IPsec / Stateful firewall / Computer network security / Computing / Network architecture

M-255 The Network Box M-255 is a member of the Network Box S-M-E product range-designed to protect small and medium-sized offices. This model is built for use in either an office or a datacenter, the M-255 uses low-powe

Add to Reading List

Source URL: www.cmssoft.co.uk

Language: English - Date: 2015-04-01 11:10:38
603CORBA / Common Object Request Broker Architecture / Component-based software engineering / Inter-process communication / Object-oriented programming / Authorization / Access control / Service-oriented architecture / Computer security / Security / Computing / Identity management

In Proceedings of the Annual Computer Security Applications Conference, Phoenix, Arizona, U.S.A., December 6-10, 1999 A Resource Access Decision Service for CORBA-based Distributed Systems Konstantin Beznosov Baptist He

Add to Reading List

Source URL: cadse.cs.fiu.edu

Language: English - Date: 2000-01-27 15:46:10
604Computer security / Inter-process communication / Access control / Security descriptor / Local Procedure Call / Access token / Object Manager / Security Identifier / Windows Registry / Microsoft Windows / Computing / Windows NT architecture

Modeling the trust boundaries created by securable objects Matt Miller Leviathan Security Group Abstract One of the most critical steps of any security review involves identifying the trust boundaries that an application

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2008-07-15 18:26:11
605Computing / OpenDNS / Fast flux / Border Gateway Protocol / Domain name / Domain name system / Internet / Network architecture

OpenDNS Investigate Datasheet Investigate Attacks Like Never Before Attackers are pivoting through your infrastructure. What if you could pivot through theirs? Many security products provide visibility into what’s hap

Add to Reading List

Source URL: info.opendns.com

Language: English - Date: 2015-05-23 02:56:09
606Internet / Unified threat management / Layer 2 Tunneling Protocol / Virtual private network / Proxy server / Point-to-Point Tunneling Protocol / Anti-spam techniques / Check Point / Comparison of firewalls / Computer network security / Computing / Network architecture

GB-2500 Gigabit Firewall UTM Appliance The GB-2500 Firewall UTM Appliance is a powerful and robust UTM appliance designed for businesses with extensive network demands. Powerful Gigabit Unified Threat Management Performa

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2014-10-21 12:09:09
607Cryptographic protocols / Secure communication / Electronic commerce / Network architecture / Transport Layer Security / FTPS / HTTP Secure / Public key certificate / SSL-Explorer: Community Edition / Computing / Internet / Internet standards

SSL Browser & Client Remote Access Browser and Client Global Technology Associates provides a SSL remote access solution featuring both a Browser and a Client for secure network access. GTA SSL Key Features • Seamless

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2012-12-06 11:38:44
608Wireless security / Network architecture / Internet / Dynamic Host Configuration Protocol / IP address / Computer network security / Computing / Internet standards

Setting up CU-Wireless with MAC OS 1. Start up your MAC and login to the desktop 2. In the top right hand corner of the desktop make sure that the Airport is turned ON 3. If you then click on the Airport icon it should d

Add to Reading List

Source URL: carleton.ca

Language: English - Date: 2013-07-02 08:14:13
609Password / Virtual private network / Cisco Systems VPN Client / Windows Vista / Computer architecture / Computer network security / Tunneling protocols / Computing

How to connect to your network drives from home It is possible to access your network drive from your personal laptop or home machine. In order to do this you will require some software called Cisco VPN. Step 1: Download

Add to Reading List

Source URL: carleton.ca

Language: English - Date: 2013-07-02 08:14:11
610Birmingham Small Arms Company / Pool fence / Architecture / Temporary fencing / Mexico – United States barrier / Boy Scouts of America / Fences / Structural engineering / Security

LICENSING INFORMATION STATEMENT #27 FENCE CONSTRUCTION BSA has developed this information statement to clarify the licensing requirements regarding the installation of fences. The Queensland Building Services Authority A

Add to Reading List

Source URL: www.qbcc.qld.gov.au

Language: English - Date: 2014-06-02 22:33:12
UPDATE