Computer network security

Results: 18127



#Item
321Computing / Business / Computer networking / Technology / OpenFlow / Network architecture / Emerging technologies / Ethernet / OpenDaylight Project / ONOS / Network function virtualization / Cisco Systems

Supercharging SDN Security Takayuki Sasaki (NEC) Topics ▌ Control-plane security l Isolation and recovery

Add to Reading List

Source URL: www.ch-open.ch

Language: English - Date: 2016-06-16 13:14:14
322Security / Prevention / Cyberwarfare / Cybercrime / National security / Computer network security / Computer security / Cryptography / United States Army Cyber Command / Cyberspace / United States Cyber Command / Password

THE FACTS: CYBERSECURITY TIPS FOR INTERNATIONAL TRAVELERS Before You Go  Treat your information and communications and the devices that contain and transmit as valuables. The more you protect

Add to Reading List

Source URL: www.arcyber.army.mil

Language: English - Date: 2016-03-15 15:31:42
323Security / Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / National security

•  Pique your interest in topics at the intersection between public domain data and international security. •  Outline some of the technical, ethical and legal challenges in this arena. •  Pose some question

Add to Reading List

Source URL: mmds-data.org

Language: English - Date: 2014-06-24 17:33:53
324Security / Cyberwarfare / Computer network security / Computer security / Cryptography / National security / Secure communication / Emergency management in American universities

Responding to Students in Distress Distressing events may happen at any time to anyone. This resource, designed for your quick reference, aims to help guide your response when you feel a student may be in distress. It wi

Add to Reading List

Source URL: vet.ucalgary.ca

Language: English - Date: 2015-10-27 17:35:08
325Cyberwarfare / Computer security / Computing / Hacking / Computer network security / Cryptography / National security / Cross-site request forgery / Oscar / SQL injection / Cross-site scripting / Application security

oscar Oscar’s radical approach to healthcare requires unparalleled application security CASE STUDY: ENTERPRISE APPLICATION

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36
326Internet privacy / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Computing / Computer security / Information privacy / Network Advertising Initiative / Cookie / Zombie cookie

Generic Cookies Policy template    Cookies Policy    Last updated: ​

Add to Reading List

Source URL: media.termsfeed.com

Language: English - Date: 2016-03-07 14:52:12
327Computing / Computer security / Payment systems / Economy / Computer law / Information privacy / Payment Card Industry Data Security Standard / Penetration test / Software testing / CDE / Network segmentation / Credit card

PCI DSS Penetration Testing Standard for University of Tennessee Merchants Revision: August 25, 2015 Purpose To outline the key roles and responsibilities, requirements, and notification methods

Add to Reading List

Source URL: 3fup3p2pb35f2iroyz2x2mre.wpengine.netdna-cdn.com

Language: English - Date: 2016-03-28 09:34:18
328Computer security / Cyberwarfare / Security / Computer network security / Hacking / Software testing / Vulnerability / Application security / Web application firewall

Microsoft PowerPoint - VulnerabilityManagementInAnApplicationSecurityWorld_OWASPDC_20090805.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:23
329Cyberwarfare / Computer security / Computing / Computer network security / Threat model / Hacking / Software testing / Threat / STRIDE / Vulnerability / SQL injection / Security

Microsoft PowerPoint - ISSA threat modeling.ppt [Read-Only]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:19
330Cyberwarfare / Computer security / Computer network security / Security / Vulnerability / Zero-day / Software bug

Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response Zhen Huang Mariana D’Angelo

Add to Reading List

Source URL: www.eecg.toronto.edu

Language: English - Date: 2016-03-14 12:44:49
UPDATE