Web

Results: 217282



#Item
91Firewall software / Computing / Software / Computer security / Fastly / Application firewall / Web application firewall / ModSecurity / Firewall / Waf / Denial-of-service attack / Varnish

Fastly WAF CUSTOMER FAQ This document provides answers to some of the most frequently asked questions about Fastly’s Web Application Firewall (WAF) service which is currently in Limited Availability (LA).

Add to Reading List

Source URL: www.fastly.com

Language: English - Date: 2017-05-15 16:12:58
92Economy / Commercial policy / International trade / International relations / Customs duties / International taxation / Protectionism / Non-tariff barriers to trade / Tariff / Export / Foreign trade of the United States / Free trade

American Political Science Review, 1, 1–20 c American Political Science Association 2017  doi:S0003055416000654

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2017-02-27 21:23:05
93

AMAZON WEB SERVICESv1 1

Add to Reading List

Source URL: d1.awsstatic.com

Language: Indonesian - Date: 2018-09-19 16:20:26
    94Cryptography / Mathematics / Theoretical computer science / Computational complexity theory / Secret sharing / Quantum complexity theory / Secure multi-party computation / IP / PP / Polynomial / Communication complexity / Lagrange polynomial

    Best of Both Worlds in Secure Computation, with Low Communication Overhead

    Add to Reading List

    Source URL: web.eecs.umich.edu

    Language: English - Date: 2018-08-09 16:19:58
    95Cryptography / Side-channel attacks / Public-key cryptography / Applied mathematics / RSA / Electromagnetic attack / GNU Privacy Guard / Chosen-ciphertext attack / Power analysis / Blinding / Elliptic-curve cryptography / Advanced Encryption Standard

    contributed articles DOI:Computers broadcast their secrets via inadvertent physical emanations that are easily measured and exploited.

    Add to Reading List

    Source URL: web.eecs.umich.edu

    Language: English - Date: 2017-08-28 17:33:56
    96Internet privacy / World Wide Web / Web analytics / Computing / Cyberspace / Computer access control / HTTP cookie / Google Analytics / Session / Opt-out / Zombie cookie

    Terms & Conditions Please read this agreement entirely and carefully before accessing this web site. By accessing the site, you agree to be bound by the terms and conditions below. If you do not wish to be bound by these

    Add to Reading List

    Source URL: www.wbw.co.uk

    Language: English - Date: 2018-05-21 08:18:56
    97Frequency modulation / Russian people / Ethnic groups in Russia / United States presidential election in Georgia

    Protecting Workers Abroad and Industries at Home: Rights-Based Conditionality in Trade Preference Programs Supplemental Materials

    Add to Reading List

    Source URL: laynamosley.web.unc.edu

    Language: English - Date: 2018-07-09 12:33:08
    98Computer memory / Computing / Computer hardware / Computer data storage / Row hammer / Dynamic random-access memory / Software Guard Extensions / Memory controller / Page table / Memory refresh / ARM architecture / Cache

    Another Flip in the Wall of Rowhammer Defenses

    Add to Reading List

    Source URL: web.eecs.umich.edu

    Language: English - Date: 2018-08-09 19:06:06
    99

    cave_st_philippe-preise_2018_i_web

    Add to Reading List

    Source URL: www.cave-st-philippe.ch

    Language: French - Date: 2018-10-05 06:55:28
      100

      Community Interaction and Conflict on the Web Srijan Kumar William L. Hamilton Stanford University, USA

      Add to Reading List

      Source URL: stanford.edu

      Language: English - Date: 2018-03-28 13:23:28
        UPDATE