Security architecture

Results: 5312



#Item
731Middleware / Data distribution service / Message-oriented middleware / Computer network security / Real-Time Innovations / SCADA / Service-oriented architecture / Access control / Communications protocol / Computing / Technology / Security

WHITEPAPER Four Keys to Securing Distributed Control Systems Executive Summary At the core of critical infrastructure and industrial applications, control systems drive today’s power grid,

Add to Reading List

Source URL: www.rti.com

Language: English - Date: 2015-04-10 15:34:04
732Ethernet / Computer network security / Data security / Internet protocols / Novell NetWare / Transmission Control Protocol / Network switch / Firewall / Port / Network architecture / Computing / OSI protocols

Sepehr S. T. Co. Ltd GateMAN 4012 GateMAN 4012 firewall is a high performance plug and play core switch to be installed in the heart of corporate networks with advanced security features. It drops all IP packets with

Add to Reading List

Source URL: www.sepehrs.com

Language: English - Date: 2005-10-29 04:40:49
733Cross-platform software / Linux / Linux kernel / Open-source software / Open source / Operating system / Debian / GNU / Security-Enhanced Linux / Software / Computing / Computer architecture

A Case Study in Open Source Patch Submission Studienarbeit in Computer Science by

Add to Reading List

Source URL: dirkriehle.com

Language: English - Date: 2012-06-09 03:32:40
734Internet protocols / Internet standards / Internet Control Message Protocol / Computer network security / Path MTU Discovery / ICMPv6 / ICMP Destination Unreachable / Transmission Control Protocol / Ip / Computing / Network architecture / Internet

Microsoft Word - draft-ietf-tcpm-icmp-attacks-00.txt

Add to Reading List

Source URL: www.gont.com.ar

Language: English - Date: 2011-11-08 11:19:24
735Network architecture / Cyberwarfare / Transmission Control Protocol / Internet protocols / Internet protocol suite / Port / Denial-of-service attack / Internet Protocol / LAND / Computer network security / Computing / Denial-of-service attacks

Microsoft PowerPoint - 25C3TCPVulnerabilities_release.ppt

Add to Reading List

Source URL: www.recurity-labs.com

Language: English - Date: 2009-01-12 07:50:45
736Credit cards / Data privacy / Payment Card Industry Data Security Standard / Cloud computing / Computing / Technology / Law / General Services Administration / Networx / Computer law

FINAL – FOR RELEASE Acumera and Liquid Networx Team Up to Securely Connect Merchants with Their Systems, Devices, and Machines Relationship extends security architecture with operational visibility and management.

Add to Reading List

Source URL: www.acumera.net

Language: English - Date: 2012-10-16 12:10:46
737Network management / System administration / Internet protocols / Internet standards / Computer network security / Iptables / Syslog / Snort / Slide / Computing / Software / System software

Secure Web Services Architecture A Case Study Matthew G. Marsh President, Paktronix Systems LLC Chief Scientist, NEbraskaCERT

Add to Reading List

Source URL: www.paktronix.com

Language: English - Date: 2004-08-30 22:34:38
738Internet standards / Internet protocols / Email / HTTP / Cryptographic protocols / Hypertext Transfer Protocol / Transport Layer Security / URI scheme / Representational state transfer / Computing / Internet / Network architecture

Internet Engineering Task Force (IETF) Request for Comments: 7230 Obsoletes: 2145, 2616 Updates: 2817, 2818 Category: Standards Track ISSN:

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2014-06-06 21:14:27
739Internet standards / Quasar / Q-Zar / File Transfer Protocol / Computer file / Computer security / File format / Computing / Internet / Network architecture

Interfacing with Quasar a White Paper from Joven Technology Quasar can accept delivery of project, report, and/or status information in a number of ways. In general, data transfer takes place by “pushing” files from

Add to Reading List

Source URL: www.joventech.com

Language: English - Date: 2013-11-17 00:51:16
740Electronics / Computer law / Internet in the United States / Information science / Audio storage / Consumer Broadband and Digital Television Promotion Act / Digital Millennium Copyright Act / Ron Wyden / Copy protection / Digital rights management / Law / 105th United States Congress

May 28, 2002 Senator Ron Wyden 516 Hart Senate Office Building Washington DCDear Senator Wyden: I am writing to you both as a constituent and as a technical expert in security architecture to ask you to

Add to Reading List

Source URL: theworld.com

Language: English - Date: 2002-05-29 04:34:38
UPDATE