Computer network security

Results: 18127



#Item
261Computing / Security / Cryptography / Data security / Information governance / Computer network security / Key management / Computer security / Apache Accumulo / Cloud computing security

Transitions A ROUNDUP OF LINCOLN LABORATORY TECHNOLOGY TRANSFER OPPORTUNITIES IN CYBER SECURITY Technology Transfer

Add to Reading List

Source URL: www.ll.mit.edu

Language: English - Date: 2016-07-12 15:25:15
262Computing / Software / BIOS / Computer architecture / Cyberwarfare / Rootkit / Firmware / Broadcom / Booting

How to develop a rootkit for Broadcom NetExtreme network cards Guillaume Delugr´e Sogeti / ESEC R&D guillaume(at)security-labs.org

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
263Computer network security / Computer security / Cyberwarfare / Computing / Personal firewall / Firewall / Jump server / Distributed firewall / Comparison of firewalls

AppGate Distributed Device Firewall – Datasheet AppGate® Distributed Device Firewall Protecting user devices and the network

Add to Reading List

Source URL: www.cryptzone.com

Language: English - Date: 2015-04-28 16:57:36
264Cyberwarfare / Denial-of-service attacks / Internet Relay Chat / Computer network security / Security / Computing / Denial-of-service attack / DDoS mitigation / Computer security / Prolexic Technologies

DDoS Attack Mitigation Service Terms and Conditions The Sure DDoS Attack Mitigation Service provides the Customer with a solution to help protect the Customer site against Distributed Denial of Service (DDoS) attacks by

Add to Reading List

Source URL: web.sure.com

Language: English - Date: 2015-10-01 03:02:11
265Prevention / Security / Safety / National security / Computer network security / Cyberwarfare / Computer security / Resilience / DHS National Protection and Programs Directorate / Enterprise risk management / Threat / Insurance

Microsoft Word - Regulatory and Market Imperatives Place Cyber Security High on Carrier Agendas - CMM Reprint

Add to Reading List

Source URL: www.brokerslink.com

Language: English - Date: 2015-04-27 09:55:18
266Computer security / Software / Security / Computer network security / Crime prevention / National security / Antivirus software / Intrusion detection system / Avira / Center for Internet Security / Attack / Security alarm

ALDR: A New Metric for Measuring Effective Layering of Defenses ∗ Nathaniel Boggs Department of Computer Science Columbia University

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
267Computing / Network architecture / Computer network security / Tunneling protocols / Virtual private networks / Internet protocols / Cryptographic protocols / IPsec / Internet security / Transport Layer Security / SoftEther VPN / Secure Socket Tunneling Protocol

Security Review: SSL VPNs —Frederick M. Avolio Executive Summary Today’s enterprises use the Internet to meet a variety of communication needs among employees, business partners, suppliers, customers, and potential c

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2007-12-29 18:01:44
268Computing / Network architecture / Network protocols / Computer network security / Application server / Software architecture / Load balancing / Hypertext Transfer Protocol / Middlebox / Transmission Control Protocol / Web server

xOMB: Extensible Open Middleboxes with Commodity Servers James W. Anderson, Ryan Braud, Rishi Kapoor, George Porter, and Amin Vahdat University of California, San Diego {jwanderson,rbraud,rkapoor,gmporter,vahdat}@cs.ucs

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2013-02-20 11:32:27
269Security / Computer security / Prevention / National security / Cyberwarfare / Computer network security / Cryptography / NIST Special Publication 800-53 / Test and evaluation master plan / Vulnerability / Threat / Information security

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DCAUG

Add to Reading List

Source URL: www.dote.osd.mil

Language: English - Date: 2015-06-12 16:42:00
270Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Computer access control / Internet Standards / Internet protocols / Transport Layer Security / OpenSSL / Authentication / Password

eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirchen

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:18:07
UPDATE