Security architecture

Results: 5312



#Item
21

Arista v. Cisco Request 15 Oct 15 Authentication requested for: RFC 2401 Security Architecture for the Internet Protocol

Add to Reading List

Source URL: iaoc.ietf.org

- Date: 2015-11-01 16:21:27
    22

    Secure Cloud Communications: Overview of Plivo’s Security Architecture and Policies Build your company on a resilient and highly available communications infrastructure WWW.PLIVO.COM/SECURITY

    Add to Reading List

    Source URL: s3.amazonaws.com

    - Date: 2016-06-10 20:26:39
      23Computing / Internet / Network architecture / Internet protocols / Cryptographic protocols / Internet Standards / Tunneling protocols / Units of information / IPsec / Padding / Transport Layer Security / IPv4

      Attacking the IPsec Standards in Encryption-only Configurations Jean Paul Degabriele1 and Kenneth G. Paterson2 ?

      Add to Reading List

      Source URL: www.isg.rhul.ac.uk

      Language: English
      24Computing / Internet / Cryptographic protocols / Secure communication / Network architecture / Hypertext Transfer Protocol / Internet security / HTTPS / Crimeware / Internet privacy / Transport Layer Security / Bolt

      Fighting Crimeware: An Architecture for Split-Trust Web Applications Richard Sharp, Anil Madhavapeddy, Roy Want, Trevor Pering, John Light IRC-TR

      Add to Reading List

      Source URL: rich.recoil.org

      Language: English - Date: 2006-04-19 14:01:38
      25Computing / Internet protocols / Cryptography / Network architecture / Cryptographic protocols / Secure communication / Computer networking / QUIC / Network protocols / Datagram Transport Layer Security / Comparison of TLS implementations / Public-key cryptography

      2015 IEEE Symposium on Security and Privacy How Secure and Quick is QUIC? Provable Security and Performance Analyses Robert Lychev MIT Lincoln Laboratory

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2015-05-11 16:43:10
      26System software / Software / Computer architecture / Boot loaders / BIOS / Booting / Cyberwarfare / Windows Vista / Rootkit / Windows Vista startup process / Reboot / Computer security

      REboot: Bootkits Revisited Bootkit Basics State of the art REboot

      Add to Reading List

      Source URL: esec-lab.sogeti.com

      Language: English - Date: 2016-07-01 12:08:46
      27African Union / Peace / Africa / Structure / African Standby Force / World / Peacebuilding / Continental Early Warning System / Peacekeeping / APSA / Peace and Security Council / Regional Economic Communities

      Imbalances in the African Peace and Security Architecture. The Current Approach to Capacity-building Needs to Be Challenged

      Add to Reading List

      Source URL: www.swp-berlin.org

      Language: English - Date: 2012-09-19 08:08:46
      28Software / Computer architecture / Computing / Cross-platform software / Oracle Database / Oracle Linux / Benchmark / MySQL / Windows Server / Linux / Oracle Corporation / Standard Performance Evaluation Corporation

      CIS CONFIGURATION ASSESSMENT TOOL (CIS-CAT) Description CIS-CAT is a configuration assessment/audit software tool available to CIS Security Benchmarks Members. Written in Java, CIS-CAT: (a) reads those CIS Security Bench

      Add to Reading List

      Source URL: benchmarks.cisecurity.org

      Language: English - Date: 2016-07-18 18:05:36
      29Computing / Computer architecture / Power Architecture / Software / AS/400 / Server hardware / IBM AIX / IBM RPG / Scott Klement / IBM WebSphere Application Server / IBM Notes / Cgidev2

      Speaker Excellence Awards – 2009 Annual Meeting and Exposition Gold Medal Sessions Richard Dolewski • Disaster Recovery Primer - Ready, Set, Plan John Earl • IBM i Security by Object Type

      Add to Reading List

      Source URL: www.common.org

      Language: English - Date: 2016-07-26 12:30:37
      30Computing / Internet / Network architecture / Internet Standards / Internet protocols / Networking hardware / Computer network security / Telnet / Internet protocol suite / Firewall / File Transfer Protocol / Gateway

      A Network Firewall Marcus J. Ranum Digital Equipment Corporation Washington Open Systems Resource Center, Greenbelt, MD June 12, 1992

      Add to Reading List

      Source URL: www.avolio.com

      Language: English - Date: 2007-12-29 18:01:38
      UPDATE