Computer network security

Results: 18127



#Item
311Computing / Media access control / Computer networking / Network architecture / Espionage / Carrier sense multiple access with collision avoidance / IEEE 802.11 / Covert channel / Carrier sense multiple access / Collision / Traffic flow / Channel access method

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 3, MARCHA Timing Channel Spyware for the CSMA/CA Protocol

Add to Reading List

Source URL: coleman.ucsd.edu

Language: English
312Computing / Network architecture / Data transmission / Flow control / Computer networking / Network protocols / Network performance / Transmission Control Protocol / Acknowledgement / Channel / Network packet / Packet loss

64 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012 Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels

Add to Reading List

Source URL: coleman.ucsd.edu

Language: English
313Computer network security / Computing / Computer security / Cyberwarfare / Layer 2 Tunneling Protocol / DMZ / Virtual private network / Network switch / Secure Computing Corporation / Firewall

Secure Computing SnapGear™ User Manual Secure Computing 4810 Harwood Road San Jose, CA

Add to Reading List

Source URL: go.mcafee.com

Language: English - Date: 2006-08-31 03:33:18
314Computer security / Cyberwarfare / Computing / Computer network security / Web applications / Software testing / Hacking / Vulnerability / Application security / Web application security / Software quality / Foundstone

Microsoft PowerPoint - DenimGroup_IntroductionToApplicationSecurity

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:27:01
315Computing / Cryptography / Security / Prevention / Computer network security / Password / Cloud computing / Computer security / Cloud storage / File hosting service / Browser security / Salt

Media Shuttle’s Defense-inDepth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among the various pl

Add to Reading List

Source URL: info.signiant.com

Language: English - Date: 2016-07-16 02:23:51
316Security / Cybercrime / National security / Prevention / Computer network security / Computer security / Cryptography / Cyberwarfare / Cyber-attack / Cyberwarfare in the United States / The Centre for Secure Information Technologies

Microsoft Word - SOE - White PaperCyber Security Engineering Studio.docx

Add to Reading List

Source URL: marketing.sandiego.edu

Language: English - Date: 2016-03-03 12:31:40
317Cyberwarfare / Computer network security / Denial-of-service attacks / Computing / Computer security / Internet Relay Chat / Denial-of-service attack / DDoS mitigation / Managed security service / Botnet / BlockDos / Prolexic Technologies

Service Provider Playbook_FINAL

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2016-06-20 09:50:39
318Security / Prevention / Cryptography / Crime prevention / Information governance / National security / Computer network security / Information flow / Database transaction / Computer security

Verifying information security of dynamic, decentralized systems Andrew Myers IC3 retreat, May 2016

Add to Reading List

Source URL: www.initc3.org

Language: English
319Computing / Internet / Network architecture / Net neutrality / Computer network security / Internet privacy / Cultural globalization / New media / Router / Peering / Virtual private network / Autonomous system

ATLAS Internet Observatory 2009 Annual Report C. Labovitz, S. Iekel-Johnson, D. McPherson Arbor Networks, Inc. J. Oberheide, F. Jahanian

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-11 18:23:19
320Security / Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / National security

TERMS OF WEBSITE USE This page (together with the documents referred to on it) tells you the terms of use on which you may make use of our website [www.hiesscheme.org.uk] (our site), whether as a guest or a registered us

Add to Reading List

Source URL: www.hiesscheme.org.uk

Language: English - Date: 2016-02-15 06:37:40
UPDATE