Security architecture

Results: 5312



#Item
831Climatology / Data sharing / Environmental science / Scientific method / Scientific misconduct / Situation awareness / Computer security / Cyberwarfare / War / Security / Hacking / Science

Discussion Draft Straw man architecture for International data exchange and collaborative analysis John C. Mallery ()

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-14 13:46:13
832Network architecture / Computer network security / Internet privacy / SOCKS / Firewall / File Transfer Protocol / ActiveX / Computing / Internet protocols / Internet

Firewall ActiveX Control SOCKS ActiveX Control for Microsoft Windows

Add to Reading List

Source URL: www.distinct.com

Language: English - Date: 2003-06-05 17:11:44
833Internet standards / Computer network security / Denial-of-service attacks / Tcpdump / Pcap / Transport Layer Security / Router / Transmission Control Protocol / Denial-of-service attack / Software / Computing / Network architecture

Another Perspective to IP-Darkspace Analysis RESTENA - CSIRT Computer Security Incident Response Team Alexandre Dulaunoy, G´erard

Add to Reading List

Source URL: static.sstic.org

Language: English - Date: 2013-06-27 13:06:37
834IEEE 802.11 / Wi-Fi / Internet / Network architecture / Wireless security / Residential gateway / Layer 2 Tunneling Protocol / SpeedTouch / O2 wireless box / Networking hardware / Computing / Broadband

WBR-6804 Version: 1 Wireless Router, 150Mbps 802.11b/g/n, USB/RJ-45 Dual-WAN, 3G LevelOne WBR-6804, a 3G mobile broadband router with high speed wireless, designed for home, SOHO and business user featuring a USB port f

Add to Reading List

Source URL: www.sone.co.th

Language: English - Date: 2015-04-20 00:21:41
835Telecommunications engineering / Ntpd / Daemon / Network protocols / Server / Timekeeper / Synchronization / Precision Time Protocol / Time server / Computing / Network Time Protocol / Network architecture

TimeKeeper® Software Security from the ground up The TimeKeeper is client and server software that can also

Add to Reading List

Source URL: www.fsmlabs.com

Language: English - Date: 2015-05-18 10:05:06
836Virtual private networks / Network architecture / Computer architecture / Crypto-anarchism / Internet privacy / Layer 2 Tunneling Protocol / Computer network security / Computing / Tunneling protocols

back Security Feature Matrix Model Name System Firewall Throughput

Add to Reading List

Source URL: www.micronexis.com

Language: English - Date: 2013-04-07 05:42:16
837Computer architecture / Android software development / Android / Mobile operating system / Malware / Symbian / Linear temporal logic / Motorola Droid / Smartphones / Software / Computing

Runtime Verification meets Android Security Andreas Bauer1,2 , Jan-Christoph K¨uster1,2 , and Gil Vegliach1 1 NICTA Software Systems Research Group · 2 The Australian National University

Add to Reading List

Source URL: kuester.multics.org

Language: English - Date: 2015-05-08 04:15:01
838Name server / Computing / Microsoft DNS / Domain Name System Security Extensions / Domain name system / Network architecture / Internet

The Collateral Damage of Internet Censorship by DNS Injection Anonymous <> presented by Philip Levis

Add to Reading List

Source URL: csl.stanford.edu

Language: English - Date: 2013-05-01 14:51:36
839Internet privacy / Computer architecture / Virtual private networks / Crypto-anarchism / WinGate / Split tunneling / Hamachi / Computer network security / Computing / Network architecture

Guideline for setting up a functional VPN

Add to Reading List

Source URL: www.wingate.com

Language: English - Date: 2007-07-04 02:43:35
840Generic top-level domain / ICANN / Domain name / Top-level domain / Internationalized domain name / Domain registration / .org / Rod Beckstrom / Domain Name System Security Extensions / Domain name system / Internet / Network architecture

VIA EMAIL Mr. Rod Beckstrom President and CEO, ICANN 4676 Admiralty Way, Suite 330 Marina del Ray, CAMr. Peter Dengate-Thrush

Add to Reading List

Source URL: forum.icann.org

Language: English - Date: 2013-09-05 11:25:06
UPDATE