Computer case

Results: 3867



#Item
251Computer security / Crime prevention / Cryptography / Information governance / National security / Application security / Application firewall / Information security / Web application firewall / Michigan State University / SQL injection / Vulnerability

CASE STUDY Michigan State University implements language security technology to address runtime threat gap In recent years, Michigan State University (MSU) set out to make information security a critical priority, invit

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2016-08-02 12:16:23
252Identity documents / Cybercrime / E-commerce / National security / Security / Computer security / Password / Identity theft

Government Case Study REDUCING FRAUD AND PROTECTING CITIZEN INFO

Add to Reading List

Source URL: www.shapesecurity.com

Language: English - Date: 2016-08-12 14:49:29
253Classes of computers / Laptop / Commercial off-the-shelf / Computer security / Operating system / Personal computer / Security Technical Implementation Guide

CASE STUDY Information Technology Services Providing Security Hardened COTS Laptops to the US DoD Overview

Add to Reading List

Source URL: www.tanagerinc.com

Language: English - Date: 2016-06-27 12:53:33
254Security / National security / Prevention / Cybercrime / Cyberwarfare / Computer network security / Computer security / Cryptography / Cyberspace / Cyber-attack

Die Fakultät für Informatik der Universität Wien lädt Sie herzlich ein zum CS-Colloquium Security of Cyber-Physical Systems (A Case Study)

Add to Reading List

Source URL: cs.univie.ac.at

Language: English
255Video hosting / Content delivery network / Dailymotion / Computer networking / Streaming / Limelight Networks

CASE STUDY Dailymotion – one of the biggest video platforms in the world! Dailymotion is one of the biggest video platforms in the world, with diverse content from sports competitions, music festivals, comedy skits, p

Add to Reading List

Source URL: www.csimagazine.com

Language: English - Date: 2016-04-13 05:02:57
256Computer memory / Memory bandwidth / CPU cache / Data / Random-access memory / Apache Spark / In-memory processing / MemSQL

Is Memory Disaggregation Feasible? A Case Study with Spark SQL Pramod Subba Rao and George Porter UC San Diego Abstract

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2016-01-17 15:09:27
257Software / Social information processing / Computing / Metaphysics / Network theory / Community building / Self-organization / Systems theory / Information / Social network / Entropy / Facebook

Influence Propagation: Patterns, Model and a Case Study Yibin Lin, Agha Ali Raza, Jay-Yoon Lee, Danai Koutra, Roni Rosenfeld, and Christos Faloutsos School of Computer Science, Carnegie Mellon University, Pittsburgh, PA

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-30 16:36:08
258Routing algorithms / Mathematics / Wireless networking / Computing / Routing protocols / Graph theory / Network theory / Edsger W. Dijkstra / Geographic routing / Greedy algorithm / Routing / Shortest path problem

Worst-Case Optimal and Average-Case Efficient ∗ Geometric Ad-Hoc Routing Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:29
259Logic / Temporal logic / Philosophical logic / Mathematical logic / Abstraction / Linear temporal logic / Logic in computer science / Supervisory control theory / Non-classical logic / CTL* / Modal logic / Quantifier

Bridging the Gap between Supervisory Control and Reactive Synthesis: Case of Full Observation and Centralized Control ? R¨ udiger Ehlers ∗ St´ ephane Lafortune ∗∗ Stavros Tripakis ∗∗∗

Add to Reading List

Source URL: excape.cis.upenn.edu

Language: English - Date: 2014-08-13 21:30:28
260Nagios / Cyberwarfare / System administration / Hacking / Vulnerability / Computer security

Greenbone Case Study Vulnerability Management Technische Universität Dresden Vulnerability Management with Greenbone and Nagios/Centreon: The sooner you recognize a problem, the faster you can react

Add to Reading List

Source URL: www.greenbone.net

Language: English - Date: 2016-06-16 08:24:26
UPDATE