Security architecture

Results: 5312



#Item
51Computing / OSI protocols / Network architecture / Data transmission / Communications protocol / Network protocols / Cryptographic protocol / Internet protocol suite / OSI model / Transport layer / Datagram / ProVerif

Developing teaching material for formal modeling of security protocols Daming Chen and Michael Huth Overview •

Add to Reading List

Source URL: www.dcddcc.com

Language: English - Date: 2016-08-05 04:38:12
52Computing / Software / Computer architecture / Smartphones / Cloud clients / E-commerce / Mobile operating systems / Information appliances / Mobile security / Android / Mobile banking / Mobile app

When Mobile is Harder Than Fixed (and Vice Versa): Demystifying Security Challenges in Mobile Environments Jon Oberheide Farnam Jahanian

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-11 18:23:00
53Computing / Computer network security / Network architecture / Wireless networking / Local area networks / IEEE 802.11 / Computer security / IEEE 802.11e-2005 / Wireless security / Denial-of-service attack / Data link layer / Transmission Control Protocol

Detecting Identity Spoofs in IEEE 802.11e Wireless Networks

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English
54Computer access control / Identity management / Computer security / Computing / Metadata standards / Security Assertion Markup Language / Authentication / EduGAIN / Workflow

MJRA1.4: First Draft of the Blueprint Architecture Milestone MJRA1.4

Add to Reading List

Source URL: aarc-project.eu

Language: English - Date: 2016-08-01 07:07:50
55Computing / Cryptography / Network architecture / Transport Layer Security / Hypertext Transfer Protocol / Internet privacy / Internet protocols / Cryptographic protocols / Proxy server / HTTPS / Apache HTTP Server / Certificate authority

The TCPProxy Table of contents 1 Starting the TCPProxy..................................................................................................2 2 Preparing the Browser...........................................

Add to Reading List

Source URL: grinder.sourceforge.net

Language: English - Date: 2014-05-20 07:02:06
56Network protocols / Computing / Computer architecture / Network architecture / Universal Plug and Play / Simple Service Discovery Protocol / Internet Gateway Device Protocol / Service discovery / Windows Rally / Streamium

Security Flaws in Universal Plug and Play Unplug. Don’t Play. January 2013 HD Moore

Add to Reading List

Source URL: hdm.io

Language: English - Date: 2015-12-05 20:38:27
57Computing / Computer network security / Ingate Systems / Ingate / SIP trunking / Network address translation / Technology / Firewall / Network architecture / Videotelephony

Welcome to the Ingate SIParator Training and Become Certified on the Ingate E-SBC products! Learn the ins and outs of working with Ingate SIParator/Firewalls to enable SIP trunking and all SIP based unified communication

Add to Reading List

Source URL: www.ingate.com

Language: English - Date: 2015-09-14 05:03:44
58Computing / Parallel computing / Computer network security / Network architecture / Network performance / Science DMZ Network Architecture / Emerging technologies / Computer cluster / Nanomaterials / Apache Hadoop / Big data

News Center for HighPerformance

Add to Reading List

Source URL: chpc.utah.edu

Language: English - Date: 2016-03-24 15:04:37
59Internet / Computing / Network architecture / Routing / Internet Standards / IP addresses / IP hijacking / Internet security / Border Gateway Protocol / Autonomous system / Route Views / Router

ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking Gavriil Chaviaras, Petros Gigis, Pavlos Sermpezis, and Xenofontas Dimitropoulos FORTH / University of Crete, Greece {gchaviaras, gkigkis, se

Add to Reading List

Source URL: www.inspire.edu.gr

Language: English - Date: 2016-06-27 04:34:24
60Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Avira / Zero-day / Computer virus / Marcin Kleczynski / IObit

C A S E S T U DY SCB builds a defense against malware Architecture firm takes preventive approach to malware with Malwarebytes Anti-Malware and gains dramatic time savings Business profile

Add to Reading List

Source URL: ru.malwarebytes.com

Language: English - Date: 2016-07-07 18:42:41
UPDATE