Computer network security

Results: 18127



#Item
221Computer network security / Computing / Virtual private networks / Computer architecture / Software / Network architecture / Internet privacy / Crypto-anarchism / Internet Connect / Point and click / SoftEther VPN / OpenVPN

Configure a VPN connection in Mac OS X The following guide is based on an English OS X Leopardbut with minor modifications the approach should work for other versions of OS X as well (For some versions it might b

Add to Reading List

Source URL: www.soc.ku.dk

Language: English - Date: 2016-08-22 10:32:30
222Computer security / Security / Cryptography / Trusted computing / Computer network security / Secure communication / National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing base / Common Criteria / TCB / United States Department of Homeland Security

æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
223Security / Business / Computer network security / Computer security / Crime prevention / Cryptography / Cyberwarfare / National security / Senior management / Unipart

Press Contact Joran Thompson FOR IMMEDIATE RELEASE 

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2016-02-01 18:01:19
224Technology / Electronics / Electromagnetism / Computer networking / Sensor node / Wireless sensor network / Signal-to-interference-plus-noise ratio / Radar / Adversary model / Beamforming / Computer network / Throughput

The 2011 Military Communications Conference - Track 3 - Cyber Security and Network Operations Multi-node Coordinated Jamming for Location Privacy Protection Sangho Oh

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2012-01-16 23:23:23
225Computing / Remote desktop / Software / System software / Computer network security / HOB GmbH & Co KG / Remote administration software / Tunneling protocols / Remote Desktop Services / Virtual private network / Remote desktop software

BSI-DSZ-CC-0832-2014_CMYK

Add to Reading List

Source URL: www.hobsoft.com

Language: English - Date: 2016-03-07 06:43:45
226Computing / Computer security / Cyberwarfare / Computer network security / Cross-site scripting / OWASP / SQL injection / Web application security / Code injection / JavaScript / Character encodings in HTML / HTTP header injection

      OWASP Top 10 Proactive Controls 2016 

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2016-01-25 17:05:07
227Computer security / Security / Cyberwarfare / Computer network security / Vulnerability / OpenVAS / Attack / Countermeasure / Security appliance / CVSS / Information security / Common Vulnerabilities and Exposures

Turn-key Vulnerability Management Greenbone Security Manager The solution for IT security in your organisation

Add to Reading List

Source URL: greenbone.net

Language: English - Date: 2016-08-19 11:06:48
228Computer network security / Computing / Virtual private networks / Computer architecture / Computer security / Tunneling protocols / Network architecture / Crypto-anarchism / OpenVPN / Windows Registry / Windows XP / SoftEther VPN

ITSC Services User Guide – VPN - For Windows XP Users VPN - For Windows XP Users Step 1. Click Start, and then click Control Panel on the

Add to Reading List

Source URL: itsc.hsmc.edu.hk

Language: English - Date: 2016-06-07 04:32:13
229Computer security / Computer network security / Security / Cyberwarfare / Data security / Cybercrime / Cryptography / Password / Firewall / Network security / Operating system / Password policy

Introduction to Intrusion Protection and Network Security Jennifer Vesperman

Add to Reading List

Source URL: en.tldp.org

Language: English - Date: 2002-03-20 10:00:48
230Computing / Cyberwarfare / Security / Computer security / Computer network security / Hacking / Software testing / Common Weakness Enumeration / Vulnerability database / Attack / Common Vulnerabilities and Exposures / Architecture tradeoff analysis method

Architectural Analysis for Security (AAFS)

Add to Reading List

Source URL: resources.sei.cmu.edu

Language: English - Date: 2015-05-01 17:51:11
UPDATE