Security architecture

Results: 5312



#Item
41Computing / Computer architecture / Ambient intelligence / Companies based in Bangalore / Sasken Communication Technologies / Ubiquitous computing / Smartphones / Internet of things / Rajiv C. Mody / Computer security / Wearable technology / Android

ANNUAL REPORT In this highly-connected world, technology is

Add to Reading List

Source URL: www.sasken.com

Language: English - Date: 2015-08-19 02:09:26
42Computing / Software engineering / Computer architecture / Method / Data types / X86 architecture / Assembly languages / Virtual method table / Subroutines / X86 assembly language / Low-level programming language / Dangling pointer

¨ BOCHUM RUHR-UNIVERSITAT Horst G¨ortz Institute for IT Security Technical Report TR-HGI

Add to Reading List

Source URL: www.ei.rub.de

Language: English - Date: 2014-12-17 10:12:31
43Computing / Hypertext Transfer Protocol / Session / World Wide Web / Invoice / Computer network security / Network architecture / Extensible Authentication Protocol

Frequently Asked Questions by Affiliates You will receive an authorization form for every client that has been approved to see you. As an affiliate, it is important that you not schedule any client without getting author

Add to Reading List

Source URL: secure.minesandassociates.com

Language: English - Date: 2013-08-06 16:42:27
44Military science / Nuclear strategies / Nuclear weapons / Military / International security / Nuclear warfare / Nuclear weapons and the United States / United States Atomic Energy Commission / United States Department of Energy / Pre-emptive nuclear strike / Nuclear triad / United States Strategic Command

 slide #1 StratCom in Context: The Hidden Architecture of U.S. Militarism* By Jacqueline Cabasso April 12, 2008; Omaha, Nebraska

Add to Reading List

Source URL: www.wslfweb.org

Language: English - Date: 2014-08-08 15:37:14
45Internet / Computing / Swanston / Transport Layer Security / Network architecture

TIP: Guide to update new mail server information on Thunderbird MAC Start Thunderbird. Click on tools at the top menu and select Account settings. Select Server Settings in the Accounts Settings Menu

Add to Reading List

Source URL: kindergarten.vic.gov.au

Language: English - Date: 2016-05-31 16:24:19
46Software / System software / Computer architecture / Disk file systems / Network file systems / File system / ZFS / Tar / XFS / Capability-based security / Filesystem in Userspace / Data

Hierarchical File Systems are Dead Margo Seltzer, Nicholas Murphy Harvard School of Engineering and Applied Sciences Abstract

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2009-04-29 19:50:23
47Network architecture / Internet Protocol / Computing / Broadband / IPv4 / IPv6 / Internet / Carrier-grade NAT / Residential gateway / Voice over IP / IPv4 address exhaustion / 6to4

COLUMNS Balkanization from Above DAN GEER AND HD MOORE Dan Geer is the CISO for In-Q-Tel and a security

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 16:26:00
48Computing / Network architecture / Internet / Smart cards / Internet protocols / Internet Standards / Cryptographic protocols / Network protocols / Subscriber identity module / Universal Integrated Circuit Card / Transport Layer Security / Hypertext Transfer Protocol

SCWS_SteppingStones_2009_v1.0.0

Add to Reading List

Source URL: simalliance.org

Language: English - Date: 2015-03-26 18:46:30
49Computer architecture / Software / System software / Embedded Linux / Linux distributions / Linux kernel / Linux / MontaVista / Loadable kernel module

Linux Kernel Exploitation Earning Its Pwnie a Vuln at a Time Jon Oberheide CTO, Scio Security This document is confidential and is intended solely for use by its original recipient for informational

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-11 18:23:38
50Computing / Internet protocols / Network architecture / World Wide Web / SPDY / HTTP/2 / QUIC / Multipath TCP / LTE / Transmission Control Protocol / Hypertext Transfer Protocol / Transport Layer Security

An Anatomy of Mobile Web Performance over Multipath TCP Bo Han Feng Qian∗ Shuai Hao Lusheng Ji

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-12-02 16:47:09
UPDATE