Computer network operations

Results: 408



#Item
221Operations research / Network theory / Network flow / Shortest path problem / Bellman–Ford algorithm / Tree / Graph / Flow network / Tree decomposition / Graph theory / Mathematics / Theoretical computer science

J Glob Optim DOI[removed]s10898[removed]Optimal placement of UV-based communications relay nodes Oleg Burdakov · Patrick Doherty · Kaj Holmberg ·

Add to Reading List

Source URL: www.ida.liu.se

Language: English - Date: 2012-01-20 06:09:28
222Graph theory / Operations research / Network theory / Shortest path problem / Diagnosis / Troubleshooting / Mathematical optimization / Algorithm / Automated planning and scheduling / Mathematics / Problem solving / Applied mathematics

Linköping Studies in Science and Technology Thesis No[removed]Computer-Assisted Troubleshooting for Efficient Off-board Diagnosis Håkan Warnquist

Add to Reading List

Source URL: www.ida.liu.se

Language: English - Date: 2012-01-24 05:41:39
223World Wide Web / Two-factor authentication / Twitter / Computer security / Security / Computer network security / Technology

OneKey Newsletter Issue[removed]Dear Service Providers, Here are this month’s highlights: • Appointment of Andy Tan as Senior Operations Manager We would like to welcome Andy Tan as our new Senior Operations Manage

Add to Reading List

Source URL: www.assurity.sg

Language: English - Date: 2014-09-15 12:24:49
224National security / Intrusion detection system / Network intrusion detection system / Computer security / Network security / Physical security / Extrusion detection / Computer network security / Security / Public safety

Mission Control Network Intrusion Detection System How can I protect the assets of my company by identifying attacks before they damage and disrupt business operations? To efficiently protect your confidential data, busi

Add to Reading List

Source URL: www.open.ch

Language: English - Date: 2014-04-25 03:08:19
225Computing / Personal firewall / Firewall / Network security / Internet security / Application firewall / Distributed firewall / Computer network security / Computer security / Cyberwarfare

References This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of many pr

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-10-07 21:43:51
226Military / Fort Leavenworth / Cyberwarfare / Net-centric / United States Army Training and Doctrine Command / USACEWP / United States Army Combined Arms Center / Electronic warfare / Network-centric warfare / United States Army / Kansas / Military science

IC Symposium Describing the Environment U.S. Army Computer Network Operations – Electronic Warfare Proponent (USACEWP) COL Wayne Parks, Director The overall classification of this brief is: UNCLASSIFIED

Add to Reading List

Source URL: usacac.army.mil

Language: English - Date: 2008-09-29 12:57:12
227National security / Email / Computer network security / Internet / Password / Internet privacy / Malware / Computer security / Authorization / Security / Computing / Crime prevention

This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential business managers, office managers and operations managers. This appendix is one of many which is being pro

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-10-07 21:43:28
228Public safety / Data security / Computer network security / Risk / Security controls / Operations security / Risk management / Vulnerability / Business continuity / Security / Computer security / Management

POLICY DOCUMENT PHYSICAL SECURITY POLICY Policy Number:POL-OPS02 Effective Date:[removed]

Add to Reading List

Source URL: www.amwater.com

Language: English - Date: 2015-01-22 16:04:19
229Operations security / HTTP cookie / Computer security / Opera / Password manager / Password policy / Software / Computer network security / Password

Cyber Opsec Protecting Yourself Online Think. Protect. OPSEC. www.ioss.gov

Add to Reading List

Source URL: www.uscg.mil

Language: English - Date: 2014-07-28 16:28:46
230Information operations / Electronic warfare / Military terminology / Battlespace / Computer network operations / United States Air Force / USACEWP / Fleet Electronic Warfare Center / Cyberwarfare / Military science / Military

September 2008 Vol. 31 • No. 9 Also in this issue: EP-3: AIRBORNE SIGINT WORKHORSE

Add to Reading List

Source URL: usacac.army.mil

Language: English - Date: 2008-09-15 17:59:49
UPDATE