Access control list

Results: 137



#Item
51Computer architecture / Network File System / GridFTP / Grid computing / Access control list / Storage Resource Broker / Distributed file system / Server / File system / Computing / Network file systems / System software

CITI Technical Report 05–3 GridNFS Global Storage for Global Collaborations Peter Honeyman [removed]

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2005-05-17 17:43:15
52Occupational safety and health / Title 15 of the United States Code / States and territories of Australia / Australia / Occupational Health and Safety Act NSW

ACAT AUTHORISING LAWS This list of the laws that authorise applications, including referrals, to the ACAT is current as at 18 November[removed]Control + Click on the links to access the legislation in the ACT Legislation R

Add to Reading List

Source URL: cdn.justice.act.gov.au

Language: English - Date: 2013-11-19 17:45:06
53Sham Shui Po / Lok Ma Chau Control Point / Beaches of Hong Kong / Lantau Island / Sheung Shui Station / Fanling Station / Sha Tin / Tai Po / Tsuen Wan District / Hong Kong / Cheung Sha Wan / Lai Chi Kok

List of Access Officer (for Publication) - (Hong Kong Police Force) District (by District Council Boundaries) Venue/Premise/Facility

Add to Reading List

Source URL: www.lwb.gov.hk

Language: English - Date: 2015-02-02 04:16:42
54Network file systems / Network File System / FreeBSD / Solaris / POSIX / Linux kernel / Access control list / Computing / Software / System software

NFSv4 Open Source Project Update Andy Adamson CITI, University of Michigan Ann Arbor

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2004-03-01 14:49:33
55North District /  Hong Kong / Tsim Sha Tsui / Lam Tin / Sceneway Plaza / Sha Tin / Hung Hom Station / Lok Ma Chau Control Point / Sha Tau Kok / Tuen Mun / Hong Kong / New Territories / Closed Area

List of Access Officer (for Publication) - Immigration Department District (by District Council Boundaries) Central & Western

Add to Reading List

Source URL: www.lwb.gov.hk

Language: English - Date: 2014-11-15 23:30:18
56International trade / Arms control / Business / International Traffic in Arms Regulations / International relations / United States Munitions List / Export / Government procurement in the United States / Bureau of International Security and Nonproliferation / Identifiers / Military technology / United States Department of Commerce

[Federal Register: September 26, 2007 (Volume 72, Number[removed]Notices] [Page[removed]From the Federal Register Online via GPO Access [wais.access.gpo.gov] [DOCID:fr26se07-128] -------------------------------------------

Add to Reading List

Source URL: www.ncnk.org

Language: English - Date: 2015-01-06 17:14:19
57Network architecture / DMZ / Stateful firewall / Network security / Access control list / Cisco ASA / Firewall / Transport Layer Security / File Transfer Protocol / Computer network security / Computing / Internet

Multiple Vulnerabilities in Cisco ASA Jeff Jarmoc, SecureWorks Inc. Black Hat USA 2010 Abstract Firewalls, being among the oldest of security devices, have become somewhat less than

Add to Reading List

Source URL: media.blackhat.com

Language: English
58Access control / Computer security / Identity management / Wiring / Mouse / Computing / Security / Electronics

prox.pad Plus IR Access System Installer Guide TM This equipment is designed to be installed and serviced by security and lock industry professionals. Please refer to the table of contents and list of illustrations on pa

Add to Reading List

Source URL: www.linearcorp.com

Language: English - Date: 2010-01-19 15:09:25
59Computing / Access control / Kernel / Access control list / Principle of least privilege / Trusted computing base / Linux kernel / File system API / File system / Software / Computer security / Security

Costs of Security in the PFS File System∗ Kevin Walsh Department of Mathematics and Computer Science College of the Holy Cross [removed] Fred B. Schneider

Add to Reading List

Source URL: ecommons.library.cornell.edu

Language: English - Date: 2012-07-26 01:01:29
60Unix / POSIX / File system / UTF-8 / Access control list / Linux / Setuid / Password / Cygwin / Software / System software / Computing

Secure Programming for Linux and Unix HOWTO David A. Wheeler Secure Programming for Linux and Unix HOWTO

Add to Reading List

Source URL: www.dwheeler.com

Language: English - Date: 2004-08-22 23:51:26
UPDATE