Security domain

Results: 1374



#Item
981Legal education / Nationality law / United States Department of Homeland Security / United States Citizenship and Immigration Services / Law / Culture / Illegal immigration to the United States / Immigration to the United States / Immigration / Illegal immigration / Immigration law

The Center for Law and Government and the Washburn Law Journal hosted: BREACHING BORDERS State Encroachment into the Federal Immigration Domain?

Add to Reading List

Source URL: www.washburnlaw.edu

Language: English - Date: 2013-10-30 16:32:33
982Computing / Internet protocols / Computer network security / Internet standards / DNSSEC / Domain Name System Security Extensions / Name server / DNS spoofing / DMZ / Domain name system / Internet / Network architecture

Federal Network Security Federal Interagency Technical Reference Architectures Domain Name System (DNS) Security Reference Architecture

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2012-08-03 12:27:13
983Network architecture / Computing / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Internet / Domain name system / Internet protocols

DNSSEC Roadmap Prepared for: Department of Homeland Security DNSSEC Deployment Initiative Prepared by:

Add to Reading List

Source URL: www.dnssec-deployment.org

Language: English - Date: 2014-07-08 16:38:33
984Data security / Virtual tape library / Data synchronization / Backup / Unitrends / ExaGrid / FalconStor Software / Data deduplication / Data Domain / Computing / Backup software / Information

Vendor Landscape: Disk Backup Point your efforts at the best target to meet your backup needs. Vendor Landscape: Disk Backup Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2013-08-05 17:06:03
985Federal Information Security Management Act / Security Content Automation Protocol / National Institute of Standards and Technology / FIPS 140-2 / Institute for Information Infrastructure Protection / Security controls / Information Security Automation Program / Information security / Domain Name System Security Extensions / Computer security / Security / Computing

Testimony of Cita M. Furlani Director Information Technology Laboratory National Institute of Standards and Technology

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-12-21 10:59:19
986Internet / Rogue software / Computer crimes / Malware / Identifiers / Rogue security software / Protein domain / Scareware / Domain name / Social engineering / System software / Cybercrime

experimental/malware/papers/leet10/graphs/fakeav-domains-driveby-vs-nondriveby.eps

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2010-04-28 13:52:51
987Domain name system / Computer network security / Ping / Traceroute / Internet Control Message Protocol / MX record / Denial-of-service attack / Dynamic DNS / Computing / Internet / Network architecture

Packets Found on an Internet Steven M. Bellovin August 23, 1993 Abstract As part of our security measures, we spend a fair amount of time and e ort looking for things that

Add to Reading List

Source URL: grox.net

Language: English - Date: 1999-06-30 05:38:31
988Computing / Internet standards / Domain name system / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Server / Transport Layer Security / Transmission Control Protocol / Internet protocols / Internet / Network architecture

Deployment Models for Backup Certificate Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-10 10:53:31
989Network architecture / Verisign / Load balancing / Content delivery network / Domain Name System Security Extensions / Root name server / Denial-of-service attack / Domain name / DNS root zone / Computing / Domain name system / Internet

VRSN_logo_vertical_CMYK_vector

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2014-03-27 16:55:04
990Password strength / Password / Access control / Password policy / Password cracking / Security / Computer security / Cryptography

Microsoft Word - AgNet Domain Password Rules

Add to Reading List

Source URL: first-call.tamu.edu

Language: English - Date: 2013-09-23 16:39:18
UPDATE