Security architecture

Results: 5312



#Item
931Internet protocols / Computing / Internet standards / Dan Kaminsky / Year of birth missing / Domain Name System Security Extensions / Name server / Time to live / DNS spoofing / Internet / Domain name system / Network architecture

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:26
932Network architecture / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / TSIG / PowerDNS / BIND / Internet / Internet protocols / Domain name system

DNS  Workbench   ccNSO  Tech  Day  @  ICANN47   Durban,  South  Africa   Mon  Jul  15,  2013   Jelte  Jansen,  CrisFan  Hesselman  

Add to Reading List

Source URL: www.sidn.nl

Language: English - Date: 2014-09-25 09:47:04
933Mach / Tunneling protocols / Internet privacy / Network architecture / Cisco Systems VPN Client / Virtual private network / Cisco Systems / Mac OS X / IOS / Computer network security / Computing / Computer architecture

PDF Document

Add to Reading List

Source URL: medarbejdere.au.dk

Language: English - Date: 2014-09-23 03:23:51
934Netflow / Firewall / Network architecture / System software / Computer network security / Computing / Malware

Search and Destroy the Unknown FROM MALWARE ANALYSIS TO INDICATIONS OF COMPROMISE Who am I? 

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-04-17 09:40:03
935Gates / Gate operator / Security / Doors / Gate / Access control / OR gate / Transmitter / Field-effect transistor / Architecture / Construction / Technology

PDF Document

Add to Reading List

Source URL: www.rotech.com.au

Language: English - Date: 2013-04-17 21:48:34
936Network architecture / Internet protocols / Computer network security / Secure communication / Cryptographic software / Transport Layer Security / Virtual private network / IPsec / HTTP Secure / Cryptographic protocols / Computing / Data

White_paper_secure_protocolsFINAL

Add to Reading List

Source URL: www.insidesecure.com

Language: English
937Cisco Systems VPN Client / Virtual private network / Cisco Systems / IOS / Mac OS X / UT-VPN / Computer network security / Computing / Computer architecture

PDF Document

Add to Reading List

Source URL: medarbejdere.au.dk

Language: English - Date: 2015-04-27 04:26:45
938JavaScript / Scripting languages / Software architecture / Portable software / Cross-site request forgery / HTTP cookie / Mashup / Cross-site scripting / Google Chrome / Software / Computing / Web development

Toward Principled Browser Security Edward Z. Yang1 Deian Stefan1 John Mitchell1 David Mazi`eres1 Petr Marchenko2 Brad Karp2 1 Stanford University 2 University College London A BSTRACT

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2013-04-19 14:14:13
939Computer security / Email / Etiquette / Internet culture / Domain name / Internet / Network architecture / Computing / Domain name system / Acceptable use policy

Document JSPG Policies Title

Add to Reading List

Source URL: www.biggrid.nl

Language: English - Date: 2013-10-24 08:44:27
940Management / Supply chain management / Shipping / Freight forwarder / Road transport / Dangerous goods / Cargo / Telematics / Technology / Transport / Logistics

SECURITY ARENA LINDHOLMEN Transport of Dangerous Goods Review of Proposed IT Architecture – Logistical and Information Focus

Add to Reading List

Source URL: www.msb.se

Language: English - Date: 2013-10-18 07:36:59
UPDATE