Computer network security

Results: 18127



#Item
241Computer security / Data security / Security / Prevention / Computer network security

Criteria Common to All [Security, Availability, Processing Integrity, and Confidentiality] Principles CC1.0 CC2.0

Add to Reading List

Source URL: www.aicpa.org

Language: English
242Computing / Technology / American brands / Videotelephony / Computer network security / Cisco Systems / Deep packet inspection / Wireless networking / Virtual private network / Wi-Fi / Bring your own device / Cisco Prime

Five Critical Considerations for Network Access Deploy and Manage Your LAN and Mobile Devices with Cisco ONE™ for Access

Add to Reading List

Source URL: webobjects.cdw.com

Language: English - Date: 2016-04-06 10:58:57
243Computing / Internet / Network architecture / Routing / Internet Standards / Computer networking / IP hijacking / Internet security / Border Gateway Protocol / Internet Routing Registry / Classless Inter-Domain Routing / Router

Stealing The Internet An Internet-Scale Man In The Middle Attack Defcon 16, Las Vegas, NV - August 10th, 2008

Add to Reading List

Source URL: we.riseup.net

Language: English - Date: 2011-01-17 04:39:11
244Cyberwarfare / Security / Computer security / Cybercrime / Computer network security / Secure communication / Cyber-security regulation / Michigan Cyber Range

OFFICE OF THE GOVERNOR October 2015 National Cyber Security Awareness Technology plays a vital role in our daily lives – California’s citizens,

Add to Reading List

Source URL: cio.ca.gov

Language: English - Date: 2015-10-22 12:53:02
245Computing / Security / Information technology management / Computer network security / Computer security / Crime prevention / Cryptography / National security / Information security / Security appliance / Intrusion detection system / Firewall

Job Opening April 19, 2016 JOB TITLE: DEPT: System Security Administrator

Add to Reading List

Source URL: esd.ny.gov

Language: English - Date: 2016-04-19 12:12:44
246Spamming / Computing / Cyberspace / Social engineering / Spam filtering / Cybercrime / Computer security / Computer network security / Cloudmark / Phishing / Email spam / Anti-spam techniques

Intelligent Spear Phishing Protection: Stopping Highly Targeted Attacks Spear phishing is one of the top threats plaguing enterprises today, often resulting in severe financial losses and theft of intellectual property.

Add to Reading List

Source URL: www.cloudmark.com

Language: English - Date: 2016-01-11 19:00:03
247Education / Educational psychology / Learning / Crime prevention / Exercise / Mathematics education / Educational technology / Active learning / Testbed / Computer security

Teaching Security With Network Testbeds Jelena Mirkovic, Mike Ryan and John Hickey (USC/ISI) Keith Sklower (UC Berkeley) Peter Reiher and Peter A. H. Peterson (UC Los Angeles) B. Hoon Kang (George Mason University) Mooi

Add to Reading List

Source URL: edusigcomm.info.ucl.ac.be

Language: English - Date: 2011-03-11 22:12:23
248Information technology management / Computing / Computer security / Data mining / Data security / Information technology / Anomaly detection / Data analysis / Intrusion detection system / Network monitoring / Anomaly / Server

Anomaly detection from server log data. A case study

Add to Reading List

Source URL: www.vtt.fi

Language: English - Date: 2015-03-18 09:57:49
249Computing / Cyberwarfare / Computer security / Computer network security / SQL / Hacking / Software testing / Web applications / SQL injection / Vulnerability / Web application security / Code injection

Achieving Web Security by Increasing the Web Application Safety Maryam Abedi Navid Nikmehr Mohsen Doroodchi

Add to Reading List

Source URL: worldcomp-proceedings.com

Language: English - Date: 2014-05-28 12:08:56
250Computer network security / Security / Computing / Cyberwarfare / Computer security / Crime prevention / Cryptography / National security / Intrusion detection system / Software-defined protection / Wireless security

Parapet_Service_Overview_20020522.doc

Add to Reading List

Source URL: www.ventajamarketing.com

Language: English - Date: 2008-12-09 00:36:52
UPDATE