Systems Network Architecture

Results: 1447



#Item
261Cyberwarfare / Computer security / Application firewall / DMZ / Cloud computing / Payment Card Industry Data Security Standard / Denial-of-service attack / Computer network security / Computing / Electronic commerce

Guarding Your Web Systems CLOUD-DMZ ™ Web Systems Security A NEW, CLOUD-BASED ARCHITECTURE

Add to Reading List

Source URL: www.sentrix.com

Language: English - Date: 2015-03-03 05:40:24
262Computing / Electronics / Democritus University of Thrace / Internet protocol suite / Internet / Framework Programmes for Research and Technological Development / Xanthi / Computer network / Delay-tolerant networking / Network architecture / Space Internetworking Center / Technology

Professor V. Tsaoussidis Internetworked Systems Lab Department of Electrical and Computer Engineering Democritus University of Thrace Xanthi, Greece, TK 67100

Add to Reading List

Source URL: www.intersys-lab.org

Language: English - Date: 2011-01-18 08:04:31
263Network file systems / Ceph / Red Hat / Ubuntu / Cloud infrastructure / Computing / Software / Computer architecture

RHST0038_Ceph_management_platform,_diagram_0315MM

Add to Reading List

Source URL: www.redhat.com

Language: English - Date: 2015-04-30 15:23:44
264Network architecture / Cryptographic protocols / Internet standards / Computer network security / Internet privacy / Cisco Systems / RADIUS / Virtual private network / Password / Computing / Internet protocols / Internet

Cisco ASA configuration for SMS PASSCODE © SMS PASSCODE® 2014 Cisco ASA configuration for SMS PASSCODE

Add to Reading List

Source URL: www.smspasscode.com

Language: English - Date: 2014-08-25 11:19:04
265Mac OS X / Configuration management / Puppet / Macintosh / Mac OS / Los Alamos National Laboratory / Operating system / Cloud computing / Computing / Computer architecture / Software

puppet labs “Prior to using Puppet, managing the Mac OS X systems in our network was a challenge. There was a real lack of visibility into both the number

Add to Reading List

Source URL: puppetlabs.com

Language: English - Date: 2013-08-10 21:58:46
266Mach / Tunneling protocols / Internet privacy / Network architecture / Cisco Systems VPN Client / Virtual private network / Cisco Systems / Mac OS X / IOS / Computer network security / Computing / Computer architecture

PDF Document

Add to Reading List

Source URL: medarbejdere.au.dk

Language: English - Date: 2014-09-23 03:23:51
267Cisco Systems VPN Client / Virtual private network / Cisco Systems / IOS / Mac OS X / UT-VPN / Computer network security / Computing / Computer architecture

PDF Document

Add to Reading List

Source URL: medarbejdere.au.dk

Language: English - Date: 2015-04-27 04:26:45
268Information / Computer networking / Network architecture / Internet protocols / Data transmission / Physical layer / Data link layer / OSI model / TCP/IP model / Computing / OSI protocols / Data

ICT aspects in Smart Distribution grids - Smart Distribution Systems August 11, 2014 Rasmus L. Olsen, Ph.D. Email:

Add to Reading List

Source URL: www.summerschool.aau.dk

Language: English - Date: 2014-08-12 01:44:25
269Smartphones / Tunneling protocols / Internet privacy / Network architecture / Virtual private network / Cisco Systems VPN Client / Cisco Systems / IOS / Android / Computer network security / Computing / Computer architecture

PDF Document

Add to Reading List

Source URL: medarbejdere.au.dk

Language: English - Date: 2014-09-23 03:23:48
270System software / Internet privacy / Network architecture / Routers / Crypto-anarchism / Virtual private network / Cisco IOS / Cisco Systems / IOS / Computing / Computer network security / Computer architecture

PDF Document

Add to Reading List

Source URL: medarbejdere.au.dk

Language: English - Date: 2014-05-15 07:52:23
UPDATE