Computer network security

Results: 18127



#Item
281Computing / Computer security / Computer access control / Computer network security / Wireless networking / Extensible Authentication Protocol / IEEE 802.1X / RADIUS / Authentication / Mutual authentication / Supplicant / Single sign-on

Secure Authentication System for Public WLAN Roaming Yasuhiko Matsunaga† Ana Sanz Merino † Takashi Suzuki‡

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-03-08 14:47:48
282Network architecture / Network address translation / Computing / Network protocols / Computer network security / Internet protocols / Traversal Using Relays around NAT / STUN / NAT traversal / Session Initiation Protocol

Introduction to the IETF ICE/TURN/STUN set of RFCs Emil Ivov, Pal Martinsen, Justin Uberti & Brandon Williams IETF 92 Copyright (cIETF Trust and the persons identified as the document authors

Add to Reading List

Source URL: ietf.org

Language: English - Date: 2015-07-07 02:17:33
283Data security / Computing / Computer security / Prevention / Computer network security / OWASP / Information security / Information Systems Security Association / Issa

Capitol of Texas ISSA Chapter - Meeting Minutes September 17, :30 AM – 1:00 PM

Add to Reading List

Source URL: www.austinissa.org

Language: English - Date: 2014-11-17 14:28:20
284Computing / Network architecture / Computer network security / IP addresses / Routing / Internet Standards / Network address translation / Port forwarding / Dynamic Host Configuration Protocol / Firewall / Private network / Iptables

1:1 NAT in ZeroShell Requirements The version of ZeroShell used for writing this document is Release 1.0.beta11. This document does not describe installing ZeroShell, it is assumed that the user already has a configured,

Add to Reading List

Source URL: www.zeroshell.net

Language: English - Date: 2011-12-28 16:43:31
285Wireless networking / Computing / Wireless / Wi-Fi / Computer network security / Technology / IEEE 802.11 / Local area networks / Wardriving / Wireless network / Wireless security / Wi-Fi Direct

PDF Document

Add to Reading List

Source URL: securingthehuman.sans.org

Language: English - Date: 2015-02-10 11:18:33
286Computer security / Computer network security / Security / Data security / Salvatore J. Stolfo / Defense in depth

ALDR: A New Metric for Measuring Effective Layering of Defenses Nathaniel Boggs, Salvatore J. Stolfo Columbia University

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
287Software / System software / Computer security / Antivirus software / Avast Software / Intel Security / Computer virus / Avira / Clam AntiVirus / F-Secure

- CloudAV N-Version Antivirus in the Network Cloud Jon Oberheide, Evan Cooke, Farnam Jahanian

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-11 18:23:52
288Cryptography / Computing / Transport Layer Security / Key management / Public-key cryptography / Hypertext Transfer Protocol / Computer network security / HTTPS / Man-in-the-middle attack / Browser security / Public key certificate / Public key infrastructure

Improving the Usability of Web Browser Security Haidong Xia and Jose´ Carlos Brustoloni Department of Computer Science, University of Pittsburgh {hdxia,jcb}@cs.pitt.edu ABSTRACT

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-06-21 09:58:18
289Cryptographic protocols / Computing / Computer network security / Local area networks / IEEE 802.11 / Wi-Fi Protected Access / 11i / Orthogonal frequency-division multiplexing / Wireless / Technology / Broadband

I N T U I C O M BroadBand Solutions 5GHzGHz BROADBAND SPECIFICATIONS K E Y F E AT U R E S

Add to Reading List

Source URL: www.econolite.com

Language: English - Date: 2016-02-19 05:24:29
290Computing / System software / Computer network security / Computer security / IP addresses / Computer networking / Data security / PfSense / Proxy server / Private network / Firewall / Subnetwork

Zeroshell as filtering bridge with connection tracking log and HAVP proxy I have already used and administrated several Firewall distributions, like IP-Cop, PFSense, Monowall, RouterOS, OpenWRT, DD-WRT, but none of them

Add to Reading List

Source URL: www.zeroshell.net

Language: English - Date: 2011-12-28 16:45:43
UPDATE