Security architecture

Results: 5312



#Item
691Videotelephony / Computing / Network architecture / Codenomicon / Session Initiation Protocol / IPv4 / IPv6 / SipX / Oulu University Secure Programming Group / Voice over IP / Software testing / Computer network security

 BLACKHAT BRIEFINGS 2005 The Art of SIP fuzzing and Vulnerabilities Found in VoIP Ejovi Nuwere – Mikko Varpiola

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:41
692Internet / Prolexic Technologies / Akamai Technologies / Denial-of-service attack / Network architecture / Denial-of-service attacks / Computer network security / Computing

AKAMAI WEB SECURITY SOLUTIONS: PRODUCT BRIEF Prolexic Connect As businesses and other organizations move increasingly online, the frequency, scale, and sophistication of denial-of-service (DoS) and distributed denial-of

Add to Reading List

Source URL: www.akamai.fr

Language: English - Date: 2015-03-27 06:58:01
693Linux kernel / Monolithic kernels / Computer security / Malware / Rootkit / Kernel / Loadable kernel module / Hooking / Ring / System software / Software / Computer architecture

Countering Kernel Rootkits with Lightweight Hook Protection Zhi Wang Xuxian Jiang

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:03
694Cyberwarfare / McAfee / Data loss prevention software / USB flash drive / Database activity monitoring / Disk encryption / Threat / Encryption / Database / Computer security / Computer network security / Security

32700_ref-architecture_0911_levels_4C

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:04:04
695Software engineering / Software architecture / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Service layer / Multitier architecture / Botnet / Slowloris / Denial-of-service attacks / Computing / Computer network security

TECHNICAL WHITE PAPER Web Application DoS/DDoS Testing Methodology Gunter Ollman Chief Technology Officer

Add to Reading List

Source URL: www.ioactive.com

Language: English
696Computer architecture / Android / IOS / Android software development / Mobile apps / Smartphones / Software / Computing

STUDENTS Print Think of it as Personal Security 101. If you sense trouble, help is just a tap away.

Add to Reading List

Source URL: www.newhaven.edu

Language: English
697Construction / Floors / Plastering / Decorative arts / Tile / Stucco / Wood / Baseboard / Plaster / Visual arts / Building materials / Architecture

U.S. DEPARTMENT OF HOMELAND SECURITY U.S. COAST GUARD CG-5571BCondition Inspection Report

Add to Reading List

Source URL: www.uscg.mil

Language: English - Date: 2012-06-12 13:11:20
698Computer architecture / Android / Antivirus software / Embedded Linux / Cloud clients / Android Market / Malware / Microsoft Security Essentials / Mobile virus / Software / Smartphones / Computing

On Lightweight Mobile Phone Application Certification∗ † William Enck, Machigar Ongtang, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The

Add to Reading List

Source URL: www.enck.org

Language: English
699Internet Protocol / Internet standards / IPv6 packet / IP fragmentation / Internet protocols / IPv4 / Ip / ICMPv6 / Transmission Control Protocol / Network architecture / Internet / IPv6

Attacking IPv6 Implementation Using Fragmentation Antonios Atlasis Centre for Strategic Cyberspace + Security Science Abstract

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 15:32:05
700Turnstile / Gate / Access control / Security / Architecture

® Pedestrian Access T: E:

Add to Reading List

Source URL: www.rotech.com.au

Language: English - Date: 2014-07-06 22:06:35
UPDATE