Security architecture

Results: 5312



#Item
661Internet protocols / Computing / Internet standards / TSIG / Cryptographic protocols / DNSCurve / Domain Name System Security Extensions / Dynamic DNS / Name server / Domain name system / Internet / Network architecture

Master System & Network Engineering Securing the last mile of DNS with CGA-TSIG Research Project 2 Supervisors:

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2014-01-08 04:14:49
662Computer architecture / Networking hardware / Tunneling protocols / Network Address Translation / Network protocols / Allied Telesis / Virtual private network / NAT traversal / DSL modem / Computing / Computer network security / Network architecture

AlliedWareTM OS Overview of | VPN Solutions in How To Notes Introduction Allied Telesis offers How To Notes with a wide range of VPN solutions, from quick and simple solutions for connecting home and remote offices, to a

Add to Reading List

Source URL: alliedtelesis.ae

Language: English - Date: 2010-08-25 21:29:48
663Trusted computing / Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / Xen / Ring / Paravirtualization / Virtual machine / Rootkit / System software / Computer security / Software

TOCTOU, Traps, and Trusted Computing Sergey Bratus, Nihal D’Cunha, Evan Sparks, and Sean W. Smith Dartmouth College, Hanover, New Hampshire Abstract. The security of the standard TCG architecture depends on whether th

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2009-11-12 16:20:18
664Computing / Security Identifier / Windows NT architecture / Commodore 64 music / Video game music / Active Directory / Windows Registry / Globally unique identifier / Relative ID / Microsoft Windows / Identifiers / Universal identifiers

MS-Windows About Security Identifiers (SIDs) First published: 02-Jul-2010 Introduction Most IT professionals can recognise a Security Identifier (SID), such as S, but where do SIDs come

Add to Reading List

Source URL: www.sekchek.com

Language: English - Date: 2013-02-22 13:16:40
665Bathing / Bathrooms / Security / Home appliances / Heating /  ventilating /  and air conditioning / Water heating / Door / Home safety / Latch / Plumbing / Architecture / Construction

HOME SAFETY CHECKLIST Priority key: A - Major - Life-threatening or serious injury potential B - Serious - Injury or property damage; correct in the short term C - Minor – Long-term action can correct the problem

Add to Reading List

Source URL: www.ncfb.org

Language: English - Date: 2007-10-16 11:08:54
666Computer network security / Computer architecture / Virtual private networks / Internet protocols / Internet standards / OpenVPN / Layer 2 Tunneling Protocol / Point-to-Point Tunneling Protocol / IPsec / Tunneling protocols / Computing / Network architecture

OpenVPN Amoocon 2010 Felix Kronlage <> @felixkronlage bytemine GmbH

Add to Reading List

Source URL: www.bytemine.net

Language: English - Date: 2015-05-18 14:09:15
667Computer security / IPsec / Stateful firewall / Computer network security / Computing / Network architecture

M-285 The Network Box M-285 is a member of the Network Box S-M-E product rangedesigned to protect small and medium-sized offices that require higher performance. This model is built for use in either an office or a data

Add to Reading List

Source URL: www.cmssoft.co.uk

Language: English - Date: 2015-04-01 11:10:39
668Computer network security / Network architecture / Internet privacy / Cyberwarfare / Network performance / Proxy server / Port / Transmission Control Protocol / Secure Shell / Computing / Internet protocols / Internet

Attachment 3 Observation by the Internet Fixed-Point Monitoring System (TALOT2) for NovemberTo General Internet Users According to the Internet Fixed-Point Monitoring System (TALOT2), 86,568 unwanted (one-sided

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-23 07:51:49
669Network architecture / Computer architecture / Virtual private networks / Cryptographic protocols / Internet protocols / IPsec / Cisco Systems VPN Client / OpenVPN / StrongSwan / Computer network security / Computing / Tunneling protocols

Mobile IPSec VPN Client The Mobile IPSec VPN Client provides the vital ability for remote users to initiate VPN communications with corporate resources. Mobile IPSec VPN Client Key Features

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2012-12-06 11:38:45
670Domain name system / Internet standards / IPv6 / Domain Name System Security Extensions / ICMPv6 / IPv4 / NLnet / Name server / Router / Network architecture / Internet / Internet protocols

Using Path MTU Discovery (PMTUD) for a higher DNS responsiveness Willem Toorop NLnet

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2013-05-31 10:00:18
UPDATE