Security architecture

Results: 5312



#Item
781World Wide Web / Scripting languages / Software architecture / Web 2.0 / Cross-platform software / JavaScript / Mashup / HTTP cookie / Same origin policy / Computing / Computer network security / Software engineering

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D4.1

Add to Reading List

Source URL: www.websand.eu

Language: English - Date: 2011-10-25 10:27:30
782Network architecture / Internet protocols / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / NLnet / Unbound / NSD / Internet / Domain name system / Computing

DNS at NLnet Labs Matthijs Mekking Topics • NLnet Labs

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2010-08-05 05:56:38
783Ethics / Clery Act / Assault / Laws regarding rape / Hate crime / Crime in the United States / Rape / Abuse / Sexual assault / Crime / Crimes / Law

Southern California Institute of Architecture (SCI-Arc) ANNUAL SECURITY REPORT August 2013 – August 2014 PURPOSE OF THE REPORT The purpose of this report is to provide information per the Student Right-to-Know and Cam

Add to Reading List

Source URL: www.sciarc.edu

Language: English - Date: 2014-11-04 00:20:14
784Networking hardware / Middlebox / Firewall / Packet Processing / Application firewall / Load balancing / Packet switching / Transmission Control Protocol / Multi-core processor / Computing / Computer network security / Computer networking

Design and Implementation of a Consolidated Middlebox Architecture Vyas Sekar∗ , Norbert Egi†† , Sylvia Ratnasamy† , Michael K. Reiter? , Guangyu Shi †† ∗ Intel Labs, † UC Berkeley, ? UNC Chapel Hill, †

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2012-11-27 06:23:17
785Network architecture / Name server / OpenDNS / Security event manager / DNS spoofing / Dynamic DNS / Domain name system / Internet / Computing

Solution Brief: Covering Your DNS Blind Spot Enhance Your Security Visibility Improve Incident Response and Policy Compliance You may be thinking: “OK, so what, why should I care about having

Add to Reading List

Source URL: info.opendns.com

Language: English - Date: 2015-05-23 10:48:36
786Network architecture / Computing / Internet standards / NSD / Internet governance / Domain Name System Security Extensions / TSIG / Country Code Names Supporting Organization / DNS zone transfer / Internet / Domain name system / Internet protocols

page 1 Evolution of a name server Jaap Akkerhuis http://www.nlnetlabs.nl/

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2011-03-15 05:18:04
787Technology / Computer architecture / Information technology audit / Computing / Dow Jones Industrial Average / IBM

Authority Swapper We love it as it allows us to have our help desk people sign in for specific menu driven tasks that require admin security levels without having to give them the keys to the entire kingdom. That and it

Add to Reading List

Source URL: www.halcyonsoftware.com

Language: English - Date: 2015-05-17 08:39:32
788Transmission Control Protocol / Microsoft SQL Server / Data / Network architecture / Computer network security / Internet protocols / Port / Computing

Attachment 3 Observation by the Internet Fixed-Point Monitoring System (TALOT2) for OctoberTo General Internet Users According to the Internet Fixed-Point Monitoring System (TALOT2), 109,390 unwanted (one-sided

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-23 07:51:48
789Data / Windows Server / Cryptographic protocols / IPsec / Windows / Firewall / Windows Vista networking technologies / Features new to Windows XP / Computing / Computer architecture / Computer network security

IPSEC for Windows – Packet Filtering David Taylor SR Information Security Specialist University of Pennsylvania

Add to Reading List

Source URL: www.upenn.edu

Language: English - Date: 2005-10-14 10:45:59
790Internet / Cyberoam / Wireless security / Unified threat management / Virtual private network / Application firewall / Stateful firewall / Layer 2 Tunneling Protocol / IPsec / Computer network security / Computing / Network architecture

Cyberoam CR25wiNG Datasheet

Add to Reading List

Source URL: www.cyberoam.com

Language: English - Date: 2015-02-05 05:42:43
UPDATE