Computer network security

Results: 18127



#Item
181Computer security / Information security operations center / Network management / Surveillance / Quantitative analyst / System on a chip / Business process modeling / Computing / Science and technology / Technology

A Human Capital Model for Mitigating Security Analyst Burnout Sathya Chandran Sundaramurthy Kansas State University

Add to Reading List

Source URL: www.usenix.org

Language: English
182Security / Computer security / Computer access control / Computer network security / Access control / Identity management / Multi-factor authentication / Authentication / Virtual private network / Secure Shell / Security token / Wireless security

Aintree NHS – Case Study Aintree University Hospitals Providing flexible and secure remote working for hospital staff

Add to Reading List

Source URL: www.cryptzone.com

Language: English - Date: 2015-04-28 16:57:36
183Security / Computer network security / Cyberwarfare / Crime prevention / Cryptography / Information governance / National security / Information technology controls / SarbanesOxley Act / Internal control / Computer security / Regulatory compliance

SECURITY COMPLIANCE MANAGEMENT COMPLY WITH SARBANES-OXLEY IT SECURITY CONTROLS The Challenge Section 404 of the Sarbanes-Oxley Act (SOX) requires that chief executives attest to the

Add to Reading List

Source URL: www.nsaservices.com

Language: English - Date: 2013-03-28 15:31:27
184Cryptography / Microsoft Windows / Computing / Computer network security / Authentication protocols / Kerberos / BitLocker / Password / Email

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
185Computing / Software / Computer security / Hacking / Computer network security / Software architecture / OWASP / ASP.NET / Application security / Cross-site scripting / Vulnerability / Web application

Microsoft PowerPoint - DenimGroup_IntroductionToApplicationSecurityInDotNETEnvironments.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:05
186Malware / Cyberwarfare / Computer security / Trojan horses / Cybercrime / Computer network security / Social engineering / Zeus / Man-in-the-browser / International cybercrime / Identity theft / Transaction authentication number

RSA 2012 CYBERCRIME TRENDS REPORT The Current State of Cybercrime and What to Expect in 2012 Cybercrime continues to show no signs of slowing down. In fact, 2011 marked a year of new advanced threats and an increased lev

Add to Reading List

Source URL: www.cs.toronto.edu

Language: English - Date: 2012-05-28 11:33:54
187Software / Computing / System software / Proxy servers / Internet privacy / Reverse proxy / Computer networking / Network performance / Microsoft Forefront Threat Management Gateway / Squid / Internet Information Services / Windows NT 4.0

Technical Research Paper Performance tests with the Microsoft Internet Security and Acceleration (ISA) Server Author:

Add to Reading List

Source URL: www.webperformance.com

Language: English - Date: 2005-12-20 21:05:41
188Computer network security / Internet privacy / Network architecture / Computing / Crypto-anarchism / Virtual private network / Computer security / Cyberwarfare

VPN Authorization Request The ___________________________________________ (department, division, program) of the Colorado School of Mines has an agreement with ___________________________ (give company and/or individual

Add to Reading List

Source URL: ccit.mines.edu

Language: English - Date: 2011-10-05 10:48:07
189Security / Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / National security / Ambient intelligence / Privacy

Call for Papers Journal of Universal Computer Science (J.UCS) Special Issue Security, Privacy and Reliability of Smart Buildings Guest Editors: Jörg Keller

Add to Reading List

Source URL: www.jucs.org

Language: English - Date: 2016-06-08 08:50:45
190Computing / Security / Computer security / Content-control software / Computer network security / Fortinet / Emerging technologies / Cloud computing / Internet of things / Accelops

Fortinet Security Fabric White Paper

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2016-08-02 16:38:44
UPDATE