Security architecture

Results: 5312



#Item
841Cyberwarfare / Data security / Crime prevention / National security / Application firewall / Vulnerability / Information security / Application security / Managed security service / Computer network security / Computer security / Security

Secure Architecture Research Report

Add to Reading List

Source URL: www.cgisecurity.com

Language: English - Date: 2008-11-02 15:38:33
842Construction / Civil defense / Naval architecture / Piracy / Safe room / Storey / Safe / Floor plan / Architecture / Security / Rooms

Masterwork Maps: Rizrac’s Safe House You probably won’t see or hear me. But if you can’t hold onto it, what’s yours will be mine. This isn’t a clean or safe part of town, but it’s my place; my refuge. Watch y

Add to Reading List

Source URL: www.darkfuries.com

Language: English
843Computing / Domain Name System Security Extensions / DNS zone / Name server / Zone file / Root name server / Time to live / CNAME record / Domain name / Domain name system / Internet / Network architecture

Chain of Trust The parent-child and keyholder-keysigner relations and their communication in DNSSEC R. Gieben Stichting NLnet Labs

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2013-01-17 10:59:05
844Data security / Replication / Erasure code / Computing / Information / Fault-tolerant computer systems / Data synchronization / Backup

THÈSE Préparée au Laboratoire d’Analyse et d’Architecture des Systèmes du CNRS Présentée pour obtenir le titre de Docteur de l’Université de Toulouse, délivré par l’Institut National Polytechnique de Tou

Add to Reading List

Source URL: www.fdn.fr

Language: English - Date: 2008-03-28 12:46:45
845Cyberwarfare / Middlebox / Firewall / Application firewall / Network switch / Router / Deep packet inspection / WAN optimization / Computer network security / Computing / Network architecture

PDF Document

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2012-11-27 06:21:03
846Internet / Network architecture / Internet protocols / Internet standards / Electronic commerce / Transport Layer Security / Proxy server / HTTP Secure / Secure Shell / Cryptographic protocols / Computing / Secure communication

Performance Analysis of TLS Web Servers Cristian Coarfa, Peter Druschel and Dan S. Wallach Department of Computer Science Rice University Abstract TLS is the protocol of choice for securing today’s ecommerce and online

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:16:24
847Network architecture / Computing / Internet standards / Computer network security / Hacking / Domain Name System Security Extensions / DNS spoofing / Name server / Extension mechanisms for DNS / Domain name system / Internet / Internet protocols

U NIVERSITY OF A MSTERDAM S YSTEM AND N ETWORK E NGINEERING Research Project 2: Identifying Patterns in DNS Traffic

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2013-08-19 08:25:34
848Internet / Cyberoam / Wireless security / Unified threat management / Virtual private network / Application firewall / Stateful firewall / Layer 2 Tunneling Protocol / IPsec / Computer network security / Computing / Network architecture

Cyberoam CR35wiNG Datasheet

Add to Reading List

Source URL: www.cyberoam.com

Language: English - Date: 2015-02-05 05:42:41
849Computer network security / Data / Internet protocols / Cryptographic protocols / Virtual private networks / IPsec / Layer 2 Tunneling Protocol / NAT-T / Point-to-Point Tunneling Protocol / Tunneling protocols / Computing / Network architecture

TheGreenBow IPSec VPN Client Configuration Guide 3COM X-FAMILY WebSite:

Add to Reading List

Source URL: www.thegreenbow.com

Language: English - Date: 2007-09-27 05:39:01
850Data / IPsec / Unified threat management / Computer network security / Computing / Network architecture

PDF Document

Add to Reading List

Source URL: www.cmssoft.co.uk

Language: English - Date: 2015-04-01 11:10:39
UPDATE