Security architecture

Results: 5312



#Item
721Computer network security / Memory management / Shellcode / X86 / Data structure alignment / Kerberos / Page / Google Native Client / Memory address / Computer architecture / Computing / Cyberwarfare

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2014-07-10 13:02:28
722Network architecture / Virtual private networks / Computer architecture / Internet privacy / OpenVPN / IPsec / Network Extrusion / VoIP VPN / Computer network security / Computing / Tunneling protocols

TheGreenBow IPsec VPN Client Configuration Guide Barracuda NG Firewall Written by: TheGreenBow TechSupport Team Company: www.thegreenbow.com

Add to Reading List

Source URL: www.thegreenbow.com

Language: English - Date: 2013-11-08 09:26:09
723Computing / Domain Name System Security Extensions / Domain name / Name server / Root name server / Top-level domain / OpenDNSSEC / Comparison of DNS server software / Domain name system / Internet / Network architecture

A paper on DNSSEC NSEC3 with Opt-Out DNSSEC – A Way Forward for TLD Registries Method for faster adoption of DNSSEC Providing greater security with minimal impact on customers, registries and Zone Management

Add to Reading List

Source URL: communitydns.net

Language: English - Date: 2011-03-29 05:11:52
724Trusted computing / Microkernel / Security / Trusted computing base / Kernel / Trusted path / L4 microkernel family / Next-Generation Secure Computing Base / Ring / Computer security / Computer architecture / System software

To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004 Reducing TCB size by using untrusted components — small kernels versus virtual-machine monitors Michael Hohmuth

Add to Reading List

Source URL: www.eros-os.org

Language: English - Date: 2005-10-18 08:59:18
725Light pollution / Street light / Architectural lighting design / Stage lighting / Light-emitting diode / Security lighting / Chartered Institution of Building Services Engineers / Skyglow / Glare / Lighting / Architecture / Light

The Institution of Lighting Engineers Email Website www.ile.org.uk GUIDANCE NOTES FOR THE

Add to Reading List

Source URL: www.britastro.org

Language: English - Date: 2013-07-26 13:28:28
726HTTP cookie / Internet privacy / Session ID / Session / Computer security / Network architecture / Access token / Security token / Load balancing / Network protocols / Computing / HTTP

Hacking Web Applications Using Cookie Poisoning Amit Klein () is security group manager for Sanctum, Inc. Summary Cookie poisoning is a known technique mainly for achieving impersonation and brea

Add to Reading List

Source URL: www.cgisecurity.com

Language: English - Date: 2008-11-02 15:05:36
727Cross-platform software / National Security Agency / Security-Enhanced Linux / Mandatory access control / TOMOYO Linux / Embedded Linux / Linux kernel / Operating system / Linux Security Modules / Computer security / Computer architecture / Software

Attacking and Defending Networked Embedded Devices Kwang-Hyun Baek Sergey Bratus Sara Sinclair

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-03-13 10:38:09
728Domain name system / Internet protocols / Akamai Technologies / Content delivery network / Computer network security / Anycast / Domain Name System Security Extensions / Denial-of-service attack / Domain name / Internet / Network architecture / Computing

AKAMAI WEB PERFORMANCE SOLUTIONS: PRODUCT BRIEF Fast DNS DNS resolution that is fast, reliable and secure

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2014-07-18 14:04:01
729Network architecture / Domain Name System Security Extensions / Domain name / PROTECT IP Act / Name server / DNS spoofing / DNS hijacking / Domain name system / Internet / Computing

THE PERILS OF USING THE DOMAIN NAME SYSTEM TO ADDRESS UNLAWFUL INTERNET CONTENT September 2011 Governments and law enforcement agencies are increasingly grappling with how best to address unlawful content and activity on

Add to Reading List

Source URL: www.cdt.org

Language: English - Date: 2011-10-13 10:07:49
730Network architecture / Hostname / DNS spoofing / Name server / Resolv.conf / DNS hijacking / Root name server / Hosts / Domain name / Domain name system / Internet / Computing

Lecture 17: DNS and the DNS Cache Poisoning Attack Lecture Notes on “Computer and Network Security” by Avi Kak () March 24, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-03-24 11:44:09
UPDATE