Computer configuration

Results: 1629



#Item
121

NATIONAL COMPUTER SECURITY CENTER A GUIDE TO UNDERSTANDING CONFIGURATION MANAGEMENT

Add to Reading List

Source URL: zedz.net

Language: English - Date: 2002-12-08 10:16:43
    122Network architecture / Emerging technologies / Configuration management / Software-defined networking / Network protocols / OpenFlow / American brands / Access control / Computer network / Cisco Systems / Network switch / Hewlett Packard Enterprise Networking

    Authentication for Resilience: the Case of SDN Dongting Yu1 , Andrew W. Moore1 , Chris Hall2 , and Ross Anderson1 1 Computer Laboratory, University of Cambridge 2

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2013-12-20 08:55:40
    123Network architecture / Emerging technologies / Computing / Computer architecture / Configuration management / Software-defined networking / Technology / OpenFlow / Network function virtualization / Routing / Big Switch Networks / Forwarding information base

    Opportunities and Research Challenges of Hybrid Software Defined Networks Stefano Vissicchio∗ Laurent Vanbever

    Add to Reading List

    Source URL: vanbever.eu

    Language: English - Date: 2014-02-26 09:18:16
    124

    Intuitive security policy configuration in mobile devices using context profiling Aditi Gupta∗ , Markus Miettinen† , N. Asokan‡ and Marcin Nagy‡ ∗ Department of Computer Science Purdue University, United States

    Add to Reading List

    Source URL: asokan.org

    Language: English - Date: 2012-11-26 07:39:34
      125Computer security / Computing / Security / Security Content Automation Protocol / Mitre Corporation / Computer network security / National security / Software quality / Extensible Configuration Checklist Description Format / Common Vulnerabilities and Exposures / Vulnerability / Open Vulnerability and Assessment Language

      Standards in reporting Software Flaws: SCAP, CVE and CWE Robin A. Gandhi, Ph.D. University of Nebraska at Omaha (UNO) College of Information Science and Technology (IS&T) School of Interdisciplinary Informatics (Si2)

      Add to Reading List

      Source URL: www.nebraskacert.org

      Language: English - Date: 2010-05-19 17:57:00
      126Domain name system / Computer networking / Internet Standards / Streaming / Internet security / Content delivery network / DNS hijacking / Server / Dynamic Host Configuration Protocol / Name server / Load balancing / Comparison of DNS server software

      PDF Document

      Add to Reading List

      Source URL: sahara.cs.berkeley.edu

      Language: English - Date: 2004-05-07 17:36:23
      127Computing / Ethernet / Security / Network architecture / Network protocols / Configuration management / Software-defined networking / OpenFlow / Computer network / Network switch / Routing / Computer security

      PDF Document

      Add to Reading List

      Source URL: www.netsec.ethz.ch

      Language: English - Date: 2015-06-01 09:06:11
      128Software / System software / User interface techniques / Computer configuration / Control Panel / Point and click / Click consonant / Button / Features new to Windows 7 / Double-click

      PDF Document

      Add to Reading List

      Source URL: alliedhealth.lsuhsc.edu

      Language: English - Date: 2013-01-25 14:39:47
      129Computing / Emerging technologies / Network architecture / Computer architecture / Configuration management / Software-defined networking / OpenFlow / Routing / Node / Peer-to-peer

      PDF Document

      Add to Reading List

      Source URL: security.cs.georgetown.edu

      Language: English - Date: 2014-05-02 15:52:05
      130Out-of-band management / Universal Serial Bus / Advanced Configuration and Power Interface / Serial port / Relay / Computer hardware / Computing / Electromagnetism

      DSSC Carputer Startup / Shutdown Controller I N S TA L L AT I O N M A N UAL Manual V2

      Add to Reading List

      Source URL: www.dashwerks.com

      Language: English - Date: 2005-06-07 12:22:56
      UPDATE