Security architecture

Results: 5312



#Item
681OSI protocols / Domain name system / IP address / IPv6 / Computer network security / Spam filtering / Network architecture / Internet protocols / Computing

A Rendezvous-based Paradigm for Analysis of Solicited and Unsolicited Traffic DUST 2012 May 15, 2012

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:42:46
682Internet protocols / Internet standards / Internet Control Message Protocol / Computer network security / Ping / ICMP Destination Unreachable / Path MTU Discovery / Transmission Control Protocol / ICMP Source Quench / Computing / Internet / Network architecture

PDF Document

Add to Reading List

Source URL: www.gont.com.ar

Language: English - Date: 2011-11-08 11:20:09
683Tunneling protocols / Internet privacy / Crypto-anarchism / Virtual private network / Cisco Systems VPN Client / Cyberwarfare / Computer security / Computer network security / Network architecture / Computing

PDF Document

Add to Reading List

Source URL: carleton.ca

Language: English - Date: 2013-07-02 08:14:11
684Internet standards / Computing / IP address management / Dynamic Host Configuration Protocol / IPv6 / Network service / IP address / Domain Name System Security Extensions / IPv4 / Network architecture / Internet / Domain name system

BlueCat Networks DNS, DHCP and IP Address Management Made Easy BlueCat Networks’ award-winning software solutions provide a platform for business-critical DNS, DHCP and IP Address Management (IPAM). Easy to deploy, con

Add to Reading List

Source URL: www.edvance.com.hk

Language: English - Date: 2012-03-29 06:31:20
685Network architecture / Internet / Cyberwarfare / Network protocols / Transmission Control Protocol / Internet standards / Port forwarding / Port / Firewall / Computer network security / Internet protocols / Computing

D90-TCP Module D90-TCP MODULE For connection to an Ethernet network

Add to Reading List

Source URL: www.lucidata.com

Language: English - Date: 2010-08-14 11:18:43
686Computing / Root name server / DNS root zone / Domain Name System Security Extensions / Extension mechanisms for DNS / Name server / Anycast / IPv6 / Transmission Control Protocol / Internet / Domain name system / Network architecture

Measurements of the Root Sever System RSSAC002 RSSAC Advisory on Measurements of the Root Server System !

Add to Reading List

Source URL: www.icann.org

Language: English - Date: 2015-05-31 03:11:58
687Internet standards / Internet governance / IPv6 / Internet Protocol / Internet Society / Domain Name System Security Extensions / IPv4 / ISOC / IPv6 deployment / Internet / Network architecture / Computing

ISOCAR08_AnnualRev_Sept14:ISOC AR05 Inside

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2009-09-16 10:24:07
688Internet / Akamai Technologies / Denial-of-service attack / Network architecture / Speedera Networks / Denial-of-service attacks / Prolexic Technologies / Computing

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Prolexic Routed DDoS defense for protecting data center infrastructures against large, complex attacks Organizations increasingly interact with customers, employees and pa

Add to Reading List

Source URL: www.akamai.fr

Language: English - Date: 2014-07-18 11:24:01
689Information Card / Authentication / Service-oriented architecture / Password authentication protocol / Security / Federated identity / Computer security

PDF Document

Add to Reading List

Source URL: www.trustindigitallife.eu

Language: English - Date: 2013-10-11 09:51:10
690Design / Backup / Data security / Reliability engineering / Stream / Peer-to-peer / Computing / Software engineering / Computer architecture

Towards Reliable Data Stream Processing with OSIRIS-SE Gert Brettlecker, Heiko Schuldt, Hans-J¨org Schek University for Health Sciences, Medical Informatics and Technology (UMIT) Hall in Tyrol, Austria firstname.lastnam

Add to Reading List

Source URL: subs.emis.de

Language: English - Date: 2013-10-04 10:31:00
UPDATE