Security architecture

Results: 5312



#Item
901Computer architecture / Allied Telesis / Virtual private network / Computer network / Virtual LAN / OpenVPN / NAT traversal / Network switch / Router / Computer network security / Computing / Network architecture

PDF Document

Add to Reading List

Source URL: www.alliedtelesis.com.au

Language: English - Date: 2015-04-22 15:59:15
902OSI protocols / Routing / Computing / Optimized Link State Routing Protocol / Link-state routing protocol / Distance-vector routing protocol / Mobile ad hoc network / Wireless networking / Routing algorithms / Network architecture

Risk-Aware Response for Mitigating MANET Routing Attacks Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, and Ruoyu Wu Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University, Tempe, AZ 85281, US

Add to Reading List

Source URL: www.public.asu.edu

Language: English - Date: 2010-08-02 20:35:26
903Internet / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Akamai Technologies / Network architecture / Prolexic Technologies / Denial-of-service attacks / Computing / Computer network security

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona DDoS Defender DDoS defense to protect websites against the increasing scale, frequency, and sophistication of attacks As businesses and other organizations move incre

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2015-04-13 05:52:02
904Computing / Domain Name System Security Extensions / Name server / Root name server / Domain name / Internet privacy / OpenDNS / Reverse DNS lookup / Tor / Domain name system / Internet / Network architecture

A privacy framework for ‘DNS big data’ applications* Cristian Hesselman, Jelte Jansen, Maarten Wullink, Karin Vink and Maarten Simon SIDN Contact person: In this paper, we discuss our privacy fr

Add to Reading List

Source URL: www.sidnlabs.nl

Language: English - Date: 2014-11-04 03:29:38
905Network architecture / Addendum / BATS Global Markets / Personal digital assistant / Bats / Computing / Technology / Electronics / Mobile computers / Computer network security / Extranet

Extranet Addendum to the BATS Global Markets, Inc. Connectivity Services Agreement This Addendum (this “Addendum”), with an effective date as of the date executed on the signature page hereof, is made by and between

Add to Reading List

Source URL: cdn.batstrading.com

Language: English - Date: 2015-04-15 13:02:35
906Sustainability / Architecture / Cradle-to-cradle design / Design / Environmental social science / Security engineering / Mir / Google / Spacecraft / Spaceflight / Waste reduction

Google Healthy Materials Program & Cradle to Cradle Certified™ The Google Healthy Materials Program evaluates all building products and materials through a rigorous screening process and uses criteria based on establis

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2015-03-04 15:02:03
907Microtechnology / Minatec / Embedded system / International Solid-State Circuits Conference / International Symposium on Circuits and Systems / Very-large-scale integration / Institute of Electrical and Electronics Engineers / IEEE Transactions on Computers / Ambient intelligence / Engineering / Technology / Electronic engineering

Design, Architecture & Embedded Software Division Leti is an institute of CEA, a French research-and-technology organization with activities in energy, IT, healthcare, defense and security. By creating innovation and tr

Add to Reading List

Source URL: www.leti.fr

Language: English - Date: 2014-06-12 05:19:12
908Community gardening / Gardening / Allotment / Food security / Growing Power / Garden / Community gardening in the United States / Organopónicos / Urban agriculture / Landscape architecture / Environment

Informal Economies of Community Gardening

Add to Reading List

Source URL: www.farmlandinfo.org

Language: English - Date: 2013-05-23 12:44:18
909Routing / Computer network security / Internet protocols / Internet standards / Border Gateway Protocol / Denial-of-service attack / Internet exchange point / HTTP Secure / Internet / Network architecture / Computing

Trusted Networks Initiative Summary VersionTrusted Networks Initiative The Trusted Networks Initiative aims at a global

Add to Reading List

Source URL: www.cybersecurityweek.nl

Language: English - Date: 2015-04-02 05:32:45
910Computer network security / Transport layer / Network architecture / Data / Computer networking / Context-based access control / Passive monitoring / Network management / Computing / Network monitoring

PDF Document

Add to Reading List

Source URL: www.athtek.com

Language: English - Date: 2015-01-21 02:00:10
UPDATE