Computer network operations

Results: 408



#Item
281Military organization / United States Department of Homeland Security / United States Department of Defense / Command and control / Joint Task Force-Global Network Operations / Net-centric / Critical infrastructure protection / EMASS / Mission assurance / National security / Security / Computer security

Microsoft Word - 70303140D8Z, R-2, Feb 2005

Add to Reading List

Source URL: comptroller.defense.gov

Language: English - Date: 2013-08-29 13:40:20
282Military organization / United States Department of Homeland Security / United States Department of Defense / Command and control / Joint Task Force-Global Network Operations / Net-centric / Critical infrastructure protection / EMASS / Mission assurance / National security / Security / Computer security

Microsoft Word - 70303140D8Z, R-2, Feb 2005

Add to Reading List

Source URL: comptroller.defense.gov

Language: English - Date: 2013-08-29 13:40:18
283Data security / Computer network security / McAfee / Companies listed on the New York Stock Exchange / Security information and event management / Vulnerability / Asset / Threat / Host Based Security System / Computer security / Security / Cyberwarfare

Solution Brief McAfee Security Management Get proactive—coordinate operations with real-time intelligence McAfee Security Management

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:03:54
284Estimation theory / Bayesian statistics / Likelihood function

From Consensus to Social Learning Ali Jadbabaie Alfred Fitler Moore Professor of Network Science Electrical and Systems Engineering, Computer & Information Sciences Operations & Information Management University of Penns

Add to Reading List

Source URL: cds20.caltech.edu

Language: English - Date: 2014-08-14 11:50:03
285Network theory / Networks / Network flow / Flow network / Operations research / Shortest path problem / Network topology / Internet backbone / Connectivity / Graph theory / Mathematics / Theoretical computer science

The Structure of Information Pathways in a Social Communication Network Gueorgi Kossinets Dept. of Sociology Cornell University Ithaca, NY 14853

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2008-06-17 16:02:39
286Theoretical computer science / Networks / Network flow / Cybernetics / Network science / Flow network / Shortest path problem / Network topology / Graph theory / Network theory / Mathematics

A Unified Network Performance Measure with Importance Identification and the Ranking of Network Components Qiang Qiang and Anna Nagurney∗ Department of Finance and Operations Management Isenberg School of Management

Add to Reading List

Source URL: supernet.isenberg.umass.edu

Language: English - Date: 2008-01-20 11:44:35
287Security / Unified threat management / Managed security service / Vulnerability / Threat / Firewall / Network security / Information security / Computer network security / Cyberwarfare / Computer security

Level 3 Managed Security Services Comprehensive Unified Threat Management Defending against cyber threats, protecting your operations, and safeguarding the information entrusted to your care is a large, complex, and cons

Add to Reading List

Source URL: caleidoscopesolutions.com

Language: English - Date: 2014-07-07 15:47:32
288Theoretical computer science / Network theory / Network topology / Computer network / Shortest path problem / Telecommunications network / Flow network / Telecommunication / Route assignment / Graph theory / Telecommunications engineering / Mathematics

Chapter 1 Supernetworks Anna Nagurney Department of Finance & Operations Management Isenberg School of Management

Add to Reading List

Source URL: supernet.isenberg.umass.edu

Language: English - Date: 2005-01-09 08:54:52
289Security / Hacking / Software testing / 105th United States Congress / Digital Millennium Copyright Act / Malware / Vulnerability / Attack / Computer security / Cyberwarfare / Computer network security

Adriel T Desautels President, Secure Network Operations, Inc Phone: [removed]

Add to Reading List

Source URL: copyright.gov

Language: English - Date: 2012-05-24 14:27:26
290Anna Nagurney / Year of birth missing / Network topology / Computer network / Network theory / Topology / Node / Science / Route assignment / Networks / Electronics / Electromagnetism

TUTORIAL ON SUPERNETWORKS Anna Nagurney John F. Smith Memorial Professor and Director: Virtual Center for Supernetworks Department of Finance and Operations Management

Add to Reading List

Source URL: supernet.isenberg.umass.edu

Language: English - Date: 2000-10-20 17:41:02
UPDATE