Control system security

Results: 2384



#Item
371Auditing / Ethics / Corporate governance / Corporations law / Management / Information security management system / AccountAbility / Internal control / Project governance / Data security / Business / Security

Microsoft Word - RM paper2.doc

Add to Reading List

Source URL: www.plumcon.com.au

Language: English - Date: 2010-01-05 23:54:25
372Computer security / Virtual private networks / Internet privacy / Tunneling protocols / Computer networking / OpenVPN / Security appliance / Proxy server / Kerio Control / Computer network security / Computing / System software

produkte:09 Uhr Seite 23

Add to Reading List

Source URL: www.securepoint.cc

Language: English - Date: 2009-10-12 10:21:52
373Domain name system / Computing / Internet standards / Extension mechanisms for DNS / Domain Name System Security Extensions / Transmission Control Protocol / Root name server / User Datagram Protocol / Name server / Internet protocols / Internet / Network architecture

Internet Engineering Task Force (IETF) Request for Comments: 5966 Updates: 1035, 1123 Category: Standards Track ISSN:

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-08-23 20:40:30
374System software / Snort / Intrusion prevention system / Firewall / Intrusion detection system / Transmission Control Protocol / Deep packet inspection / Packet Processing / Network processor / Computer network security / Computing / Software

SafeCard: a Gigabit IPS on the network card Willem de Bruijn† , Asia Slowinska† , Kees van Reeuwijk† , Tomas Hruby† , Li Xu∗ , and Herbert Bos† † Vrije Universiteit Amsterdam

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-06-27 14:10:05
375Access control / Access control list / Unix / Filesystem permissions / Mandatory access control / Role-based access control / Grsecurity / Access Control Matrix / Type enforcement / Computer security / Security / System software

SELinux and grsecurity: A Side-by-Side Comparison of Mandatory Access Control and Access Control List Implementations Michael Fox, John Giordano, Lori Stotler, Arun Thomas {mrf4u, jcg8f, les7j, at4a}@cs.virginia.edu

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2005-08-24 18:01:33
376Netop Remote Control / Information technology management / Remote administration / Windows Mobile / Comparison of remote desktop software / Remote administration software / System software / Software

Why do over half of Fortune 100 companies use Netop Remote Control? Because security matters. Netop is the most secure, trusted and scalable remote support software solution on the market today. We’ve been helping cust

Add to Reading List

Source URL: www.netop.com

Language: English - Date: 2015-02-17 16:55:36
377Internet protocols / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Extension mechanisms for DNS / Name server / Transmission Control Protocol / Domain name system / Internet / Network architecture

Measuring the effects of DNSSEC deployment on query load Jelte Jansen∗ NLnet Labs May 1, 2006

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:06:49
378Security / Access control / Computer security / Identity management / GUI widget / Menu / IBM System/34 and System/36 Screen Design Aid / Menu bar / System software / Software / Graphical user interface elements

CONCEPT 3OOO & AccessUser Manual. 1

Add to Reading List

Source URL: www.citiguard.com.au

Language: English - Date: 2012-12-13 01:36:57
379Speaker recognition / Iris recognition / Fingerprint recognition / Facial recognition system / Biometrics Institute / Authentication / Access control / Soft biometrics / Biometrics / Security / National security

A Survey of Biometrics Security Systems

Add to Reading List

Source URL: www.cse.wustl.edu

Language: English - Date: 2011-12-10 05:12:54
380Computing / System software / Access control / Capability-based security / Mandatory access control / Mandatory Integrity Control / File system / Security-Enhanced Linux / Inode / Unix / Computer security / Inter-process communication

Information Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2007-08-17 11:07:47
UPDATE