Security architecture

Results: 5312



#Item
741Internet protocols / Computing / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Session Initiation Protocol / DNS spoofing / Name server / .arpa / Internet / Domain name system / Network architecture

DNSSEC Why, how, why now? Olaf Kolkman (NLnet Labs) http://www.nlnetlabs.nl/

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:09
742Network protocols / Electronics / Wireless networking / Next-generation network / Network security / Delay-tolerant networking / Packet switching / Internet / 3GPP Long Term Evolution / Network architecture / Computing / Technology

New-Generation Network R&D Project 新世代ネットワーク戦略プロジェクト National Institute of Information and Communications Technology

Add to Reading List

Source URL: nict.go.jp

Language: English - Date: 2014-08-13 01:28:31
743Network architecture / Data security / Internet / Port / Firewall / Transmission Control Protocol / Stateful firewall / Port knocking / Computer network security / Computing / Internet protocols

Qube3 Firewall How-To This is a step by step document for anyone who wants to set up the basic firewall feature on their Qube3. This HOW-TO intends to explain a few basic things about firewalls and port access. All commu

Add to Reading List

Source URL: pkgmaster.com

Language: English - Date: 2014-10-09 03:15:33
744Internet / Cyberoam / Unified threat management / Security appliance / Application firewall / Stateful firewall / Virtual private network / IPsec / Proxy server / Computer network security / Computing / Network architecture

CR35iNG Future-ready Future-ready Security for SOHO/ROBO networks

Add to Reading List

Source URL: www.cyberoam.com

Language: English - Date: 2015-02-05 05:42:59
745Network architecture / Virtual private networks / Computer architecture / Cryptographic protocols / Internet protocols / OpenVPN / IPsec / Cisco Systems VPN Client / VoIP VPN / Computer network security / Tunneling protocols / Computing

TheGreenBow IPSec VPN Client Configuration Guide Astaro Security Gateway WebSite:

Add to Reading List

Source URL: www.thegreenbow.com

Language: English - Date: 2010-06-18 13:31:06
746Gate operator / Access control / Architecture / Construction / Security / Automation

® Automation T: www.rotech.com.au

Add to Reading List

Source URL: www.rotech.com.au

Language: English - Date: 2012-02-15 22:39:12
747Crypto-anarchism / Internet privacy / Network architecture / Virtual private network / Point-to-point protocol / Computer architecture / Computer network security / Computing / Internet

GB-Ware Feature Specifications Specifications User Unrestricted Limited

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2014-04-23 15:13:27
748Planning / Scheduling / Server / Domain Name System Security Extensions / Cache / Network architecture / Computing / Internet / Operations research

Unbound in C San DiegoWouter Wijngaards () http://www.nlnetlabs.nl/ © Stichting NLnet Labs

Add to Reading List

Source URL: unbound.net

Language: English - Date: 2008-01-02 07:02:11
749Android / Computing / Embedded Linux / Android Market / Mobile software / Application software / Symbian / Android software development / Security and safety features new to Windows Vista / Software / Smartphones / Computer architecture

Semantically Rich Application-Centric Security in Android Machigar Ongtang, Stephen McLaughlin, William Enck and Patrick McDaniel Department of Computer Science and Engineering The Pennsylvania State University, Universi

Add to Reading List

Source URL: www.enck.org

Language: English
750Data / Network architecture / Tunneling protocols / Internet privacy / IPsec / Internet Security Association and Key Management Protocol / Virtual private network / Cryptographic protocols / Computing / Computer network security

TheGreenBow IPSec VPN Client Configuration Guide AlliedTelesis AT-AR700 Series WebSite:

Add to Reading List

Source URL: www.thegreenbow.com

Language: English - Date: 2010-02-11 09:02:10
UPDATE