Security architecture

Results: 5312



#Item
611Sawmill / Virtual private network / Computing / Cyberwarfare / Computer security / Computer network security / Internet privacy / Network architecture

PDF Document

Add to Reading List

Source URL: www.sawmill.net

Language: English - Date: 2006-11-28 20:18:38
612HTTP / Cryptographic protocols / Secure communication / Internet protocols / Computer network security / Cyberoam / Application firewall / Reverse proxy / World Wide Web / Computing / Internet / Network architecture

PDF Document

Add to Reading List

Source URL: www.cyberoam.com

Language: English - Date: 2014-07-01 06:43:28
613Information technology management / Enterprise architecture / ISO standards / Enterprise modelling / Integrated development environments / Enterprise Architect / Model-driven engineering / Entity-relationship model / Modeling language / Unified Modeling Language / Software engineering / Data modeling

Sparx Systems Enterprise Architect Supports Security Industry Association Standards Development Leading trade group in the electronic and physical security market adopts premier modeling tool for development of standards

Add to Reading List

Source URL: sparxsystems.com.au

Language: English - Date: 2013-07-22 11:31:41
614Broadband / VoIP phone / Session border controller / Session Initiation Protocol / Next-generation network / Skinny Call Control Protocol / Stateful firewall / Network address translation / Media Gateway Control Protocol / Voice over IP / Network architecture / Videotelephony

Configuring VoIP for SonicOS Enhanced Document Scope This solutions document describes how to deploy and manage SonicWALL’s integrated VoIP security features to enable the secure deployment of VoIP communications in a

Add to Reading List

Source URL: www.voipmechanic.com

Language: English - Date: 2013-12-19 11:40:35
615Crypto-anarchism / Internet privacy / Network architecture / Virtual private network / Universal Serial Bus / Global Technology Associates /  Inc. / Computer network security / Computing / Computer hardware

PDF Document

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2014-04-21 16:09:33
616Internet / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Akamai Technologies / Network architecture / Prolexic Technologies / Denial-of-service attacks / Computing / Computer network security

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona DDoS Defender DDoS defense to protect websites against the increasing scale, frequency, and sophistication of attacks As businesses and other organizations move incre

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2015-04-13 05:52:02
617Internet protocols / Computer network security / Data / Cryptographic protocols / Virtual private networks / OpenVPN / IPsec / NAT-T / RADIUS / Computing / Tunneling protocols / Network architecture

DOC Document

Add to Reading List

Source URL: www.thegreenbow.com

Language: English - Date: 2013-02-24 23:10:01
618Access control / Construction / Doors / Gate operator / Gates / Turnstile / Gate / Lock / Boom barrier / Transport / Security / Architecture

® Pedestrian Access T: E:

Add to Reading List

Source URL: www.rotech.com.au

Language: English - Date: 2013-03-21 20:59:35
619Network architecture / Internet standards / Telnet / Transmission Control Protocol / Portmap / Secure Shell / Port / Ident / Netstat / Internet protocols / Computing / Internet

Lecture 21: Buffer Overflow Attack Lecture Notes on “Computer and Network Security” by Avi Kak () April 2, 2015 3:58pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-02 15:59:28
620Network architecture / Computer network security / Address Resolution Protocol / ARP spoofing / Dynamic Host Configuration Protocol / DNS spoofing / DSniff / IP address / Man-in-the-middle attack / Internet standards / Internet / Computing

TARP: Ticket-based Address Resolution Protocol Wesam Lootah, William Enck, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The Pennsylvania Stat

Add to Reading List

Source URL: www.enck.org

Language: English
UPDATE