Computer network operations

Results: 408



#Item
161Crime prevention / Military communications / Computer network security / Communications security / Cryptography / Computer security / COMSEC / Operations security / Security / National security / Cyberwarfare

Dimensions of Security: Vocabulary Crossword Puzzle ! 1 2

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-10-21 11:41:16
162Management / Humanitarian aid / Occupational safety and health / Crime prevention / National security / Disaster / Emergency operations center / Computer network / Computer security / Public safety / Emergency management / Disaster preparedness

Information technology : where is it in the coordination of emergency services?

Add to Reading List

Source URL: www.aic.gov.au

Language: English - Date: 2009-05-25 16:53:50
163National security / Surveillance / Information technology management / Campaign for Nuclear Disarmament / Security operations center / Information Technology Infrastructure Library / Information security / Security / Computer security / Public safety

Building a SOC “The CND SOC Service is extremely flexible and can be tailored around a client’s needs. ” Computer Network Defence Ltd’s (CND) Security Operations Centre (SOC) Service is a framework which provides

Add to Reading List

Source URL: www.securitywizardry.com

Language: English - Date: 2013-01-25 17:48:05
164Windows NT / Microsoft Windows / Network operating system / Novell NetWare / Operating system / Client–server model / Server / Windows NT 4.0 / Shared resource / Computer architecture / Software / Computing

7 Network Operations ○ ○

Add to Reading List

Source URL: cdn.preterhuman.net

Language: English - Date: 2001-01-07 00:27:10
165Automated Systems Holdings Limited / Computer network security / Public safety / Information security / Security information and event management / Managed security service / Security operations center / PCCW Solutions / Computer security / Security / Data security

[For Immediate Release] AUTOMATED OPENS SECURITY OPERATION CENTER IN HONG KONG TO PROVIDE MANAGED SECURITY SERVICES * *

Add to Reading List

Source URL: www.infosecurityproject.com

Language: English - Date: 2014-10-23 00:12:41
166System software / Computer hardware / Server hardware / Mac OS X / Power-on self-test / SCSI / Apple Network Server / Open Firmware / Firmware / BIOS / Computing / Booting

K Service Source Theory of Operations Network Servers Theory of Operation

Add to Reading List

Source URL: www.erik.co.uk

Language: English - Date: 2005-01-05 13:16:58
167Data security / Computer network security / McAfee / Companies listed on the New York Stock Exchange / Security information and event management / Vulnerability / Asset / Threat / Host Based Security System / Computer security / Security / Cyberwarfare

Solution Brief McAfee Security Management Get proactive—coordinate operations with real-time intelligence McAfee Security Management

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:03:54
168Data security / Computer network security / McAfee / Companies listed on the New York Stock Exchange / Security information and event management / Vulnerability / Asset / Threat / Host Based Security System / Computer security / Security / Cyberwarfare

Solution Brief McAfee Security Management Get proactive—coordinate operations with real-time intelligence McAfee Security Management

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:03:54
169Data security / Computer network security / McAfee / Companies listed on the New York Stock Exchange / Security information and event management / Vulnerability / Asset / Threat / Host Based Security System / Computer security / Security / Cyberwarfare

Solution Brief McAfee Security Management Get proactive—coordinate operations with real-time intelligence McAfee Security Management

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:03:54
170Theoretical computer science / Routing and wavelength assignment / Fiber-optic communications / Network theory / Network protocols / Algorithm / Traffic grooming / Shortest path problem / Network topology / Mathematics / Applied mathematics / Operations research

Offline Impairment Aware RWA Algorithms for Cross-Layer Planning of Optical Networks

Add to Reading List

Source URL: www.pointurier.org

Language: English - Date: 2009-03-14 18:03:15
UPDATE