Computer network operations

Results: 408



#Item
181Authentication / Notary / Packaging / Password / Multi-factor authentication / Information security / Two-factor authentication / Network security / Security / Access control / Computer security

CYBER SECURITY OPERATIONS CENTRE (UPDATED) AUGUST 2012 Mitigating the use of stolen credentials to access agency information

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2012-12-19 17:52:25
182Computer network security / Web hosting / Cloud storage / Cyberwarfare / Denial-of-service attack / Denial-of-service attacks / Cloud computing / Web hosting service / Online shopping / Computing / Concurrent computing / Distributed computing

CYBER SECURITY OPERATIONS CENTRE OCTOBER 2014 Preparing for and Responding to Denial of Service Activities Introduction

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2014-10-24 01:16:48
183Public safety / Security / Network security / Computer security

CYBER SECURITY OPERATIONS CENTRE JUNE[removed]U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL REFERENCES TO ASD SHO

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2014-06-18 01:34:28
184Crime / Computer network security / Antivirus software / Malware / Identity management / Computer security / Identity theft / Phishing / Keystroke logging / Cybercrime / Security / Computer crimes

CYBER SECURITY OPERATIONS CENTRE (UPDATED) AUGUST 2012 Personal computing and the implications for agency networks

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2012-12-19 17:55:03
185Operations research / Routing algorithms / Network theory / Shortest path problem / Network flow / Routing / Flow network / Floyd–Warshall algorithm / Dynamic programming / Mathematics / Graph theory / Theoretical computer science

EVERYTHING IS BROKEN EXCEPT HOPE Eleanor Saitta @Dymaxion

Add to Reading List

Source URL: dymaxion.org

Language: English - Date: 2015-03-06 09:52:27
186Operations research / Routing algorithms / Network theory / Shortest path problem / Network flow / Routing / Flow network / Floyd–Warshall algorithm / Dynamic programming / Mathematics / Graph theory / Theoretical computer science

Mobile Transit Trip Planning with Real–Time Data, J. Jariyasunant, D. Work, B. Kerkez, R. Sengupta, S. Glaser, and A. Bayen Transportation Research Board 89th Annual Meeting, Washington, D.C., Jan[removed], 2010. Mobile

Add to Reading List

Source URL: bayen.eecs.berkeley.edu

Language: English - Date: 2015-01-21 14:55:55
187Computer programming / Notation / Computing / Generator / Incentive

Mr Chris Pattas General Manager Network Operations and Development Branch Australia Energy Regulator GPO Box 520 Melbourne Vic 3001

Add to Reading List

Source URL: www.aer.gov.au

Language: English - Date: 2012-08-27 17:53:01
188Computing / Cyberwarfare / Computer security / Virtual private network / Split tunneling / Internet security / Avaya VPN Router / Mobile virtual private network / Computer network security / Network architecture / Internet privacy

       CYBER SECURITY OPERATIONS CENTRE  APRIL 2013 

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2013-07-17 23:49:01
189Network theory / Applied mathematics / Shortest path problem / Simulation / Mathematical optimization / Operations research / Mathematics / Theoretical computer science

Microsoft Word - simOpt#7.docx

Add to Reading List

Source URL: www.stegger.net

Language: English - Date: 2013-05-31 06:14:44
190Iraq–United States relations / War on Terror / Iraq / Politics of Iraq / Information warfare / Weapon of mass destruction / Computer network operations / Invasion of Iraq / Iraq War / Contemporary history / Military science / War

Microsoft Word - _6_ CoxG1.doc

Add to Reading List

Source URL: www.houstonlawreview.org

Language: English - Date: 2006-04-22 01:34:20
UPDATE