Security architecture

Results: 5312



#Item
671Network architecture / Cyberoam / Unified threat management / Security appliance / Application firewall / Stateful firewall / Virtual private network / IPsec / Proxy server / Computer network security / Computing / Internet

CR50iNG Future-ready Future-ready Security for SME networks

Add to Reading List

Source URL: www.cyberoam.com

Language: English - Date: 2015-02-05 05:42:58
672Internet standards / Network performance / IP traceback / Computer network security / Differentiated services / Transmission Control Protocol / IP address spoofing / Explicit Congestion Notification / Communications protocol / Network architecture / Computing / Internet

An Algebraic Approach to IP Traceback Drew Dean Xerox PARC Matt Franklin U.C. Davis

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:15:05
673Visual arts / Emergency light / Security lighting / Light fixture / Light-emitting diode / Stage lighting / Lux / Smart Lighting / Lighting / Architecture / Light

Microsoft PowerPoint - 09 Safety Lighting.ppt

Add to Reading List

Source URL: lrf.fe.uni-lj.si

Language: English - Date: 2015-01-26 09:41:16
674Computer security / Identity management / Software as a service / Provisioning / Service-oriented architecture / Cloud computing security / Anakam / Computing / Cloud computing / Centralized computing

identity as the new perimeter: securely embracing cloud, mobile and social media

Add to Reading List

Source URL: www.itworldcanada.com

Language: English - Date: 2014-10-14 11:25:43
675Concurrent computing / Data distribution service / Computer security / Data security / Data center / Cloud computing / Data architecture / Electronic health record / Security service / Data management / Computing / Information technology management

WHITEPAPER Is Your Data Secure? Executive Summary Any organization’s most valuable assets include its digital data. Safeguarding these assets raises questions: which assets require security, and what type of security

Add to Reading List

Source URL: www.rti.com

Language: English - Date: 2015-04-10 15:34:04
676Network architecture / Computer network security / Internet privacy / SOCKS / Firewall / Port / File Transfer Protocol / Application firewall / Reverse connection / Internet protocols / Computing / Internet

FWALL-32 Library Firewall Dynamic Link Library for Microsoft Windows

Add to Reading List

Source URL: www.distinct.com

Language: English - Date: 2003-06-11 16:43:06
677Routing protocols / Public-key cryptography / Internet protocols / Internet standards / Border Gateway Protocol / Routing / Digital signature / Convergence / RSA / Internet / Network architecture / Computing

Simulation Modelling Practice and Theory–216 www.elsevier.com/locate/simpat Evaluation of efficient security for BGP route announcements using parallel simulation David M. Nicol

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:44:25
678Network architecture / Cyberoam / Unified threat management / Security appliance / Application firewall / Stateful firewall / Virtual private network / IPsec / Proxy server / Computer network security / Computing / Internet

CR200iNG Future-ready Future-ready Security for SME networks

Add to Reading List

Source URL: www.cyberoam.com

Language: English - Date: 2015-02-05 05:42:56
679Computer architecture / System software / Cisco Systems VPN Client / Virtual private network / Windows / Profile configuration file / Computer network security / Computing / Tunneling protocols

TheGreenBow VPN Client Pro Deployment Guide Website: www.thegreenbow.com Contact: Property of TheGreenBow – Sistech S.A. © 2014

Add to Reading List

Source URL: www.thegreenbow.fr

Language: English - Date: 2014-11-24 08:44:24
680Data security / Ethernet / Network switch / Firewall / Transmission Control Protocol / Port / Data / Packet analyzer / Network tap / Computer network security / Computing / Network architecture

Nusoft Newsletter – IR Series No.4 Tech Overview : Nusoft Internet Recorder Accommodates Your Network

Add to Reading List

Source URL: www.nusoft.com.tw

Language: English - Date: 2012-10-23 00:46:24
UPDATE