Security architecture

Results: 5312



#Item
61Computing / Internet / Domain name system / Network architecture / Internet protocols / Internet Standards / Domain Name System Security Extensions / Google Public DNS / Name server / DNSCrypt / Transmission Control Protocol / DNSCurve

2015 IEEE Symposium on Security and Privacy Connection-Oriented DNS to Improve Privacy and Security Liang Zhu∗ , Zi Hu∗ , John Heidemann∗ , Duane Wessels† , Allison Mankin† , Nikita Somaiya∗ ∗ USC/Informat

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:06
62Domain name system / Internet / Computing / Network architecture / Root name server / Name server / Domain name / DNS hosting service / Domain Name System Security Extensions / DNS zone

DNS data collection and analysis Kazunori Fujiwara, JPRS <> Copyright © 2015 Japan Registry Services Co., Ltd.

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2015-10-30 06:39:46
63Computing / Computer security / Cyberwarfare / Hacking / Data management / Software architecture / Software testing / SQL / SQL injection / Foundstone / OWASP / Vulnerability

Microsoft PowerPoint - AnIntroductionToApplicationSecurityInJ2EEEnvironments_JavaMUG.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:16:27
64Computing / Network architecture / Cryptographic protocols / Computer network security / Cryptography / Tunneling protocols / Virtual private networks / Internet protocols / IPsec / Internet Key Exchange / Layer 2 Tunneling Protocol / NAT traversal

Secure Business Connectivity HOBLink VPN 2.1 Gateway The VPN Solution for More Security and Greater Flexibility Edition 10|13

Add to Reading List

Source URL: www.hobsoft.com

Language: English - Date: 2014-01-10 07:06:54
65Computer access control / Cryptography / Computer security / Computing / Password / Security token / Login / Session / Password manager / Self-service password reset

Security Measures of Trading System AyersGTS’s underlying software architecture is supported by a Security Server which provides (a) user authentication by login mechanism; (b) maintains session’s validity; (c)functi

Add to Reading List

Source URL: www.hkfoundersc.com

Language: English - Date: 2015-06-22 02:44:30
66Safety / Doors / Door furniture / Architecture / Prevention / Door / Security alarm / Garage door / Garage / Lock / Vehicle door

Vacation Security CHECKLIST A house that is properly secured, looks “lived in” and is watched by neighbors is a far less likely target for thieves. Follow this checklist to secure your home before your big trip!

Add to Reading List

Source URL: police.uci.edu

Language: English - Date: 2016-08-02 19:05:16
67Computing / Network architecture / Internet / Internet protocols / Tunneling protocols / Network address translation / IPsec / Computer network security / IP address / Multihoming / Internet protocol suite / Transmission Control Protocol

PDF Document

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2015-11-01 16:38:59
68Information technology / Information technology management / Engineering / Method engineering / Management / Security / Systems engineering / Joint Capabilities Integration Development System / Analysis of Alternatives / Department of Defense Architecture Framework / Risk management / ITIL

Interoperability ClearingHouse Architecture Assurance Method (AAM) A consensus base process standard for enabling sound IT investment decisions Streamlined DoDand Clinger Cohen Act Compliance

Add to Reading List

Source URL: www.ichnet.org

Language: English - Date: 2011-09-13 11:23:10
69Computer network security / Internet privacy / Network architecture / Smart card / Ubiquitous computing / Virtual private network / Computing / Technology / Humancomputer interaction

The use of smart cards in healthcare Working more secure and efficient with the UZIpas Central GP Service Drenthe can

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:42
70Software / Computing / Computer architecture / Computing platforms / Monolithic kernels / Kernel / Linux kernel / Address space layout randomization / Linux / Android / User space

Anatomy of a Remote Kernel Exploit Dan Rosenberg Copyright © 2011 Virtual Security Research, LLC.

Add to Reading List

Source URL: vulnfactory.org

Language: English - Date: 2012-01-16 13:38:49
UPDATE