MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
SandboxComputer securityThreshold cryptosystemHardware security moduleAccess control matrixRole-based access controlState machine replicationTake-grant protection modelSecurity engineeringCyber-security regulationInformation security managementIpsecLattice-based access controlSecurity controlsFirewallHigh-availability clusterEncapsulationLogical access controlNetwork access controlCross-domain solutionData integrity fieldSubnetwork connection protectionCryptographic protocolMandatory access controlMemory protectionCloud computing securityAcidIntrusion detection systemInformation hidingDiscretionary access controlNetwork securityFault toleranceDdos mitigationFault detection and isolationShadow stackDigital securityCapability-based securityEcc memoryControl-flow integrityType systemSoftware system safetySecurity event managerDisk encryption softwareHardware-based encryptionFunction modelComputer architectureError detection and correctionExecutable space protectionBuffer overflow protectionError correction codeFilesystem-level encryptionRaidInter-process communicationIt security standardsDynamic perfect hashingNumerical relayDatabase securityFormal specificationData structureSecurity testingTrademarkData center securityStandard raid levelsHierarchical control systemLockPrivilege separationHash treeFormal methodsCache replacement policiesBrowser securityGuardSecure codingPassword policyChain of trustIp address managementInformation rights managementPower system protectionHypercube internetwork topologyAddress space layout randomizationMultilevel securityHttp strict transport securityHierarchical storage managementBackupTrust boundaryCircular bufferCryptosystemSoftware-defined perimeterData redundancySoftware transactional memoryApplication domainHardware virtualizationTransmission securityPriority ceiling protocolInformation securityLinked data structureQuantum error correctionAuthorizationMultitier architectureDual modular redundancyContent security policy