Security architecture

Results: 5312



#Item
891Building biology / Architecture / Cradle-to-cradle design / Environmental social science / Security engineering / Volatile organic compound / Polyethylene terephthalate / Chemistry / Optical materials / Waste reduction

PDF Document

Add to Reading List

Source URL: www.shawcontractgroup.com

Language: English - Date: 2014-10-17 12:15:41
892Asbestos / Mandatory access control / Multilevel security / Kernel / Process management / Server / Operating system / EROS / Principle of least privilege / Computer security / Computing / Computer architecture

Labels and Event Processes in the Asbestos Operating System STEVE VANDEBOGART, PETROS EFSTATHOPOULOS, and EDDIE KOHLER University of California, Los Angeles MAXWELL KROHN, CLIFF FREY, DAVID ZIEGLER, FRANS KAASHOEK, and R

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2007-12-14 14:49:25
893Network architecture / Internet privacy / Network performance / Computer network security / Proxy server / IP address / DNS rebinding / Reverse proxy / Proxy auto-config / Computing / Internet / Computer networking

PDF Document

Add to Reading List

Source URL: www.thesecuritypractice.com

Language: English - Date: 2010-03-10 13:17:17
894Community gardening / Gardening / Allotment / Market garden / Garden / Food systems / Food security / Community gardening in the United States / Urban agriculture / Environment / Landscape architecture

PDF Document

Add to Reading List

Source URL: sydneyfoodfairness.org.au

Language: English - Date: 2009-07-19 05:39:25
895Internet / Computer network security / Multi-agent systems / Network architecture / Internet protocols / Botnet / Name server / Domain name / Fast flux / Domain name system / Spamming / Computing

PDF Document

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2010-11-22 15:23:20
896Visual arts / Light fixture / Architectural lighting design / Light-emitting diode / Recessed light / LED lamp / Emergency light / Security lighting / Cove lighting / Lighting / Architecture / Light

PDF Document

Add to Reading List

Source URL: www.enlightenz.co.nz

Language: English - Date: 2015-04-07 00:04:51
897Internet / Prolexic Technologies / Akamai Technologies / Denial-of-service attack / Network architecture / Denial-of-service attacks / Computer network security / Computing

PDF Document

Add to Reading List

Source URL: www.akamai.co.kr

Language: English
898Computer network security / Computer architecture / Network protocols / Virtual private networks / Internet protocols / Point-to-Point Tunneling Protocol / Check Point VPN-1 / IPsec / Network address translation / Tunneling protocols / Computing / Network architecture

PDF Document

Add to Reading List

Source URL: www.impsec.org

Language: English - Date: 2001-02-19 16:02:44
899Computer network security / Pcap / Packet capture / Multiprotocol Label Switching / Denial-of-service attack / Network switch / Network traffic measurement / Software / Computing / Network architecture

PDF Document

Add to Reading List

Source URL: www.emulex.com

Language: English
900Internet / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Akamai Technologies / Network architecture / Prolexic Technologies / Denial-of-service attacks / Computing / Computer network security

PDF Document

Add to Reading List

Source URL: it.akamai.com

Language: English - Date: 2015-04-13 05:52:02
UPDATE