[go: up one dir, main page]

Acevedo, 2013 - Google Patents

Buffer 46 Success Secrets-46 Most Asked Questions on Buffer-What You Need to Know

Acevedo, 2013

Document ID
7170012132086384247
Author
Acevedo C
Publication year

External Links

Snippet

There has never been a Buffer Guide like this. Buffer 46 Success Secrets is not about the ins and outs of Buffer. Instead, it answers the top 46 questions that we are asked and those we come across in our forums, consultancy and education programs. It tells you exactly how to …
Continue reading at dl.acm.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/44Arrangements for executing specific programmes
    • G06F9/455Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment

Similar Documents

Publication Publication Date Title
Luttgens et al. Incident response & computer forensics
Badger Zenoss core network and system monitoring
Freiss Protecting Networks with Satan: Internet Security for System Administrators
Palmer et al. Guide to operating systems
Acevedo Buffer 46 Success Secrets-46 Most Asked Questions on Buffer-What You Need to Know
Cordero et al. IBM PowerVM Virtualization Introduction and Configuration 2013
Mills Putting the classroom in the cloud with virtual desktops and bring-your-own-device
Baird Server 236 Success Secrets-236 Most Asked Questions on Server-What You Need to Know
Abbott Firewall 122 Success Secrets: 122 Most Asked Questions On Firewall-What You Need To Know
Oriyano et al. CEH v9: Certified Ethical Hacker Version 9 Kit
Nastase Hacking with Kali Linux: A step by step guide for you to learn the basics of cybersecurity and hacking
Denneman et al. VMware vSphere 6.7 Clustering Deepdive
Seguis Microsoft Windows Server 2008 Administration
Garrett bridge 114 Success Secrets: 114 Most Asked Questions On bridge-What You Need To Know
Alston Protocol 32 Success Secrets-32 Most Asked Questions on Protocol-What You Need to Know
MacRory The School and Small Business Computer, Server and Network Guide: The easy to understand guide covering configuration, recommendations, and... for Windows computer systems and networks.
Nastase Hacking: Hacking Essentials, Learn the basics of Cyber Security and Hacking
Eshan Ethical Hacking: A Beginners Guide To Learning The World Of Ethical Hacking
Kohli Architecting Microsoft Azure Solutions Study & Lab Guide Part 2: Exam 70-535
Jacobson HTML 173 Success Secrets: 173 Most Asked Questions On HTML-What You Need To Know
Herold et al. VMware Infrastructure 3: Advanced Technical Design Guide and Advanced Operations Guide
Shebaro Digital forensics: you can run but you can't hide: conference tutorial
Lane Wireless Hacking: How to Hack Wireless Networks
Khan et al. Design and Architecture of SNMP Monitoring System
Klein et al. Azure Stack for Datacenters