Computer network security

Results: 18127



#Item
271Computing / Computer security / Cyberwarfare / Computer network security / Hacking / Cross-site scripting / Vulnerability / OWASP / Software quality / Application security / Software / Security

Microsoft PowerPoint - DenimGroup_IntroductionToApplicationSecurity.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:17:57
272Computing / Network architecture / Internet / Internet Standards / Internet protocols / Computer network security / TACACS / IP address / Transmission Control Protocol / Simple Network Management Protocol / RADIUS / File Transfer Protocol

LX-Series Configuration Guide Corporate Headquarters MRV Communications, Inc. Corporate CenterNordhoff Street

Add to Reading List

Source URL: pbxbook.com

Language: English - Date: 2015-09-02 09:36:53
273Technology / Computing / Security / Computer network security / Internet privacy / Cultural globalization / Internet / New media / Telegraphy / Content-control software / Educational technology / Computer security

INSTRUCTIONTechnology Usage Policy The Inter-Lakes School District (hereto referred as “District”) recognizes the value of computer and other

Add to Reading List

Source URL: www.inter-lakes.k12.nh.us

Language: English - Date: 2016-05-31 20:05:16
274Spamming / Computing / Computer network security / Multi-agent systems / Botnets / Concurrent computing / Command and control / Storm Worm / Email spam / Storm botnet / Kelihos botnet

Challenges in Experimenting with Botnet Detection Systems Adam J. Aviv Andreas Haeberlen University of Pennsylvania Abstract

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-07-08 13:42:23
275Security / Computing / Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / National security / Parser Grammar Engine / WECC / Pilot

Microsoft PowerPoint03_24 PGE 2016 WECC Low Impact Generation Pilot Project REV.3 Final

Add to Reading List

Source URL: www.wecc.biz

Language: English - Date: 2016-05-26 11:12:43
276Security / Cyberwarfare / Computer security / Cryptography / Computer network security / Cybercrime / Malware / Internet privacy / Antivirus software / CrySyS Lab

Int. Secure Systems Lab Vienna University of Technology Identifying Dormant Functionality in Malware Programs Paolo Milani Comparetti

Add to Reading List

Source URL: oakland31.cs.virginia.edu

Language: English - Date: 2010-05-26 16:17:45
277Computer security / Security / Computer access control / Cyberwarfare / Identity theft / Cybercrime / Computer network security / Rogue software / Spyware / Password / Multi-factor authentication / Phishing

Tips on Online Security Security Practices to Safeguard Your Password You are advised to adopt the following: • • •

Add to Reading List

Source URL: secure.ifastnetwork.com

Language: English - Date: 2014-09-25 22:08:54
278Computing / Computer network security / Computer security / Software / Computer access control / Directory services / RADIUS / NetIQ eDirectory / TACACS / Integrated Windows Authentication / Comparison of mail servers

RadiusNT & RadiusX The Ultimate RADIUS Servers For Windows NT, Linux, Solaris & Cobalt Appliances Version 4.0

Add to Reading List

Source URL: www.iea-software.com

Language: English - Date: 2006-11-25 04:29:55
279Computer access control / Computer security / Computing / Computer network security / Federated identity / Wireless networking / Internet protocols / Authentication / IEEE 802.1X / RADIUS / Single sign-on / Mutual authentication

Secure Authentication System for Public WLAN Roaming ‡ Yasuhiko Matsunaga †

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-05-10 19:56:51
280Computer security / Security / Computer access control / Computer network security / Access control / Identity management / Cryptography / Authentication / Password / Trusted computing base / User / Multilevel security

Computer Security in the Real World Butler W. Lampson1 Microsoft Abstract After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason i

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2000-11-10 16:38:10
UPDATE