and Security Technologies

Results: 1110



#Item
421Applied mathematics / Quantum cryptography / Cryptography / Emerging technologies / Quantum computer / Quantum information / Quantum mechanics / Qubit / Quantum / Theoretical computer science / Physics / Quantum information science

February[removed]Physics and: digital security An Institute of Physics briefing note When so much sensitive information

Add to Reading List

Source URL: www.iop.org

Language: English - Date: 2015-04-07 09:33:12
422Internet Protocol / Network telescope / DIMES / Cooperative Association for Internet Data Analysis / Computer network / IPv6 / Traceroute / IPv4 / Router / Network architecture / Internet / Computing

Supporting Research and Development of Security Technologies through Network and Security Data Collection Cooperative Agreement FA8750[removed], CAIDA, UCSD PROJECT MANAGEMENT PLAN 1. Project Description.

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-02-02 18:52:30
423Decision support system / Information science / Technology / Information technology / Executive information system / Diplomatic Security Service / Technology Evaluation Centers / Decision theory / Information systems / Knowledge engineering

Web-Based and Model-Driven Decision Support Systems: Concepts and Issues Daniel J. Power, Department of Management, University of Northern Iowa, [removed] Abstract New technologies, especially the World-Wide Web tech

Add to Reading List

Source URL: dssresources.com

Language: English - Date: 2007-05-30 13:30:47
424Mobile telecommunications / Electronic commerce / Communication / Information and communication technologies for development / Ken Banks / Mobile banking / FrontlineSMS / Nathan Eagle / MLearning / Technology / Mobile technology / Mobile phones

stability Banks, K 2013 Reflections on a Decade of Mobiles in Development. Stability: International Journal of Security & Development, 2(3): 51, pp. 1-5, DOI: http://dx.doi.org[removed]sta.cm

Add to Reading List

Source URL: www.donorscharter.org

Language: English - Date: 2014-09-03 04:50:43
425Denial-of-service attack / Load balancing / Computing / Cyberspace / Armorlogic / Computer network security / Denial-of-service attacks / Prolexic Technologies

Prolexic Application Based (PLXabm) Layer 7 DDoS attack monitoring and analysis

Add to Reading List

Source URL: www.prolexic.com

Language: English
426Communication / Educational technology / Security / Information and communication technologies in education / Cloud computing / Computer security / Information technology / Technology / Computing

Arab ICT Organization Training workshops [2015] Training Workshops program[removed]______________________________________________

Add to Reading List

Source URL: www.aicto.org

Language: English - Date: 2015-03-16 09:28:52
427Agronomy / Food politics / Crops / Sustainable agriculture / Industrial agriculture / Food security / Food and Agriculture Organization / Wheat / Agricultural productivity / Agriculture / Food and drink / Land management

Using enabling technologies to meet demands for food security and sustainability Peter Stoutjesdijk and José ten Have Research by the Australian Bureau of Agricultural and Resource Economics and Sciences

Add to Reading List

Source URL: pandora.nla.gov.au

Language: English - Date: 2014-08-11 21:34:47
428Denial-of-service attack / Load balancing / Computing / Cyberspace / Armorlogic / Computer network security / Denial-of-service attacks / Prolexic Technologies

Prolexic Application Based (PLXabm) Layer 7 DDoS attack monitoring and analysis

Add to Reading List

Source URL: www.prolexic.com

Language: English
429Hydrology / Meteosat / Agriculture / Agricultural science / Remote sensing / Food security / EUMETSAT / Drought / Water content / Earth / Spaceflight / Atmospheric sciences

Stochastic Optimization Model Using Remote Sensing Technologies for Agricultural Management in Africa Wesonga Ronald Makerere University, Institute of Statistics and Applied Economics, Department of Planning and Applied

Add to Reading List

Source URL: www.fao.org

Language: English - Date: 2014-12-05 11:24:15
430Software distribution / Akamai Technologies / Content delivery network / Computer security / Software as a service / Application firewall / Cloud computing / Computing / Centralized computing

AKAMAI INDUSTRY FEATURE SHEET Software as a Service Fast, reliable, and secure SaaS application delivery SaaS providers leverage Akamai to deliver SaaS applications quickly and securely with the goals

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2014-11-14 11:08:01
UPDATE