Proxy server

Results: 1769



#Item
981Network protocols / Inter-process communication / File locking / Session / Proxy server / Peer-to-peer / Virtual synchrony / Consensus / Distributed file system / Computing / Network file systems / Fault-tolerant computer systems

The Chubby lock service for loosely-coupled distributed systems Mike Burrows, Google Inc. Abstract We describe our experiences with the Chubby lock service, which is intended to provide coarse-grained locking as well as

Add to Reading List

Source URL: static.googleusercontent.com

Language: English - Date: 2012-04-01 20:13:23
982Network performance / Database caching / Cross-platform software / Proxy server / CPU cache / Content delivery network / Apache HTTP Server / Web cache / Database management system / Computing / Cache / Computer networking

Scalable Query Result Caching for Web Applications Charles Garrod [removed] Computer Science Dept. Carnegie Mellon University

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2009-08-27 01:02:40
983Cyberwarfare / Cyberoam / Application firewall / Stateful firewall / Virtual private network / Security appliance / Firewall / Proxy server / Network security / Computer network security / Computing / Computer security

Cyberoam CR2500iNG-XP Datasheet

Add to Reading List

Source URL: webshop.systemec.nl

Language: English - Date: 2014-04-14 11:29:11
984Internet protocols / Network architecture / Tor / Man-in-the-middle attack / Secure Shell / Anonymizer / File Transfer Protocol / Relay / Proxy server / Internet / Computing / Internet privacy

Spoiled Onions: Exposing Malicious Tor Exit Relays∗ Philipp Winter1 , Richard Köwer3 , Martin Mulazzani2 , Markus Huber2 , Sebastian Schrittwieser2 , Stefan Lindskog1 , and Edgar Weippl2 1

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2014-05-17 19:16:31
985Software / Tor / Onion routing / Proxy server / Anonymizer / Simple Mail Transfer Protocol / Internet Relay Chat / HTTP cookie / Client–server model / Computing / Internet privacy / Internet

Detecting Traffic Snooping in Tor Using Decoys Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis, and Angelos D. Keromytis Columbia University, NY, USA {sc2516,porto,mikepo,angelos}@cs.columbia.edu

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2011-06-21 18:20:19
986Cyberwarfare / Cyberoam / Application firewall / Security appliance / Stateful firewall / Virtual private network / Proxy server / Firewall / Network security / Computer network security / Computing / Computer security

Cyberoam CR1000iNG-XP Datasheet

Add to Reading List

Source URL: webshop.systemec.nl

Language: English - Date: 2014-04-14 11:29:04
987Cyberwarfare / Cyberoam / Application firewall / Stateful firewall / Virtual private network / Security appliance / Firewall / Proxy server / Network security / Computer network security / Computing / Computer security

CR500iNG-XP datasheet.cdr

Add to Reading List

Source URL: webshop.systemec.nl

Language: English - Date: 2014-04-14 11:15:58
988Cyberwarfare / Cyberoam / Application firewall / Stateful firewall / Virtual private network / Security appliance / Firewall / Proxy server / Network security / Computer network security / Computing / Computer security

Cyberoam CR1500iNG-XP Datasheet

Add to Reading List

Source URL: webshop.systemec.nl

Language: English - Date: 2014-04-14 11:29:08
989Internet privacy / Network architecture / Network performance / Computer network security / Proxy servers / SOCKS / Reverse proxy / Cache / Proxy auto-config / Computing / Computer networking / Internet

INDEM DOCUMENTATION SERIES The Proxy Server R L

Add to Reading List

Source URL: indem.iiita.ac.in

Language: English - Date: 2011-04-07 03:00:01
990Reverse proxy / Computer networking / Network performance / Apache HTTP Server / Java enterprise platform / Apache Tomcat / Lucene / Proxy server / Mod ssl / Software / Computing / Cross-platform software

Apache Overview HOWTO Apache Overview HOWTO Table of Contents Apache Overview HOWTO...............................................................................................................................1

Add to Reading List

Source URL: www.tldp.org

Language: English - Date: 2008-12-14 11:52:40
UPDATE