Security architecture

Results: 5312



#Item
811Architecture / Construction / Gates / Turnstile / Gate operator / Gate / Boom barrier / Door / Transport / Security / Access control

® Pedestrian Access T: E:

Add to Reading List

Source URL: www.rotech.com.au

Language: English - Date: 2014-03-20 21:03:22
812Repurchase agreement / Collateral / Short / Bank / Security / Data architecture / Finance / Financial economics / Economics

February 12, 2015 To the Financial Stability Board Japanese Bankers Association Comments on the Consultative Document “Standards and Processes for Global

Add to Reading List

Source URL: www.zenginkyo.or.jp

Language: English - Date: 2015-02-12 03:06:16
813Smartphones / Android / Computer architecture / Access Control Matrix / Filesystem permissions / Principle of least privilege / Kernel / Operating system / Android Market / Computing / Software / Embedded Linux

Networking and Security Research Center Technical Report NAS-TRMitigating Android Software Misuse Before It

Add to Reading List

Source URL: www.enck.org

Language: English
814Network architecture / Cyberoam / Application firewall / Stateful firewall / Virtual private network / Security appliance / Firewall / Proxy server / IPsec / Computer network security / Computing / Computer security

Cyberoam CR1000iNG-XP Datasheet

Add to Reading List

Source URL: www.cyberoam.com

Language: English - Date: 2015-03-16 06:36:54
815Programming language implementation / Live migration / Hyper-V / VM / Hypervisor / Xen / Spring / Hardware virtualization / Virtual firewall / System software / Software / Virtual machines

DACSA: A Decoupled Architecture for Cloud Security Analysis Jason Gionta1 , Ahmed Azab3 , William Enck1 , Peng Ning1 , and Xiaolan Zhang2 1 North Carolina State University {jjgionta,whenck,pning}@ncsu.edu

Add to Reading List

Source URL: gionta.org

Language: English - Date: 2014-07-20 15:18:58
816Computer security / Cyberoam / Unified threat management / Wireless security / Virtual private network / Layer 2 Tunneling Protocol / IPsec / Stateful firewall / SCADA / Computer network security / Computing / Network architecture

CR15wiNG Future-ready CR15wiNG

Add to Reading List

Source URL: www.cyberoam.com

Language: English - Date: 2015-02-05 05:43:05
817Network architecture / Computer architecture / Virtual private network / IPsec / Billion / Cisco Systems VPN Client / VoIP VPN / Cisco 837 / Computer network security / Computing / Tunneling protocols

TheGreenBow IPSec VPN Client Configuration Guide Billion BiGuard 10 WebSite:

Add to Reading List

Source URL: www.thegreenbow.com

Language: English - Date: 2008-11-01 15:41:44
818Routing protocols / Internet protocols / Internet standards / Border Gateway Protocol / Routing / Computer networking / Path vector protocol / Router / Convergence / Network architecture / Internet / Computing

IMPACT OF BGP SECURITY DEPLOYMENT ON ROUTE VALIDATION ALEX ȘTEFĂNESCU 2 MarBGP SECURITY ISSUES

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2011-03-03 09:07:54
819Network architecture / Cyberoam / Application firewall / Stateful firewall / Virtual private network / Security appliance / Firewall / Proxy server / IPsec / Computer network security / Computing / Computer security

Cyberoam CR2500iNG-XP Datasheet

Add to Reading List

Source URL: www.cyberoam.com

Language: English - Date: 2015-03-16 06:36:50
820Transport / Aviation / Economy of Malaysia / French architecture / Mas / Malaysia Airlines

Market Analysis Subgroup (MAS) October 2013 TOR – Market Analysis Subgroup Background and justification The Regional Food Security and Nutrition Working Group (FSNWG), based in Nairobi is a coordinating platform for re

Add to Reading List

Source URL: www.disasterriskreduction.net

Language: English - Date: 2013-11-20 01:48:54
UPDATE