Computer network security

Results: 18127



#Item
411Data security / Computer security / Security / Computer network security / Cryptography / Security controls / ISO/IEC 27002 / Vulnerability / Information security / Payment Card Industry Data Security Standard / Asset / Health Insurance Portability and Accountability Act

Microsoft Word - Vendor Compliance Program (VCP) (v2016.1)

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:18:13
412Wireless networking / Computer network security / IEEE 802.11 / Wi-Fi / IEEE 802.1X / Cryptographic protocols

How to Connect Your Android Device to the “KSU” WiFi Network 1. On the Home screen, click on your MENU icon or button. The screen below will appear at the bottom of your phone. Then select the Settings icon.

Add to Reading List

Source URL: ksuhousing.kennesaw.edu

Language: English - Date: 2015-09-01 10:59:13
413Cyberwarfare / Cybercrime / Computer network security / Spamming / National security / Botnet / Computer security / Phishing / Malware / Ransomware / Storm botnet / Supply chain attack

CYBER SECURITY VOCABULARY - For business leaders UNDERSTAND YOUR IT DEPARTMENT AND LEAD IN THE EVENT OF A CYBER CRISIS Ever found your IT team was speaking a different language when it came to cyber security?

Add to Reading List

Source URL: www.controlrisks.com

Language: English - Date: 2016-08-04 06:27:46
414Public-key cryptography / Hypertext Transfer Protocol / Computer network security / Public key infrastructure / Internet privacy / HTTP cookie / Email / Computer security

Techniques for Visual Feedback of Security State Tara Whalen and Kori Inkpen Dalhousie University Halifax, NS, Canada {whalen, inkpen}@cs.dal.ca Introduction and Overview

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English
415Internet protocols / Computer network security / Network address translation / Network protocols / Internet Protocol / Internet protocol suite / Application-level gateway / Resource Reservation Protocol / Transmission Control Protocol / Application layer / IPv6 / Traversal Using Relays around NAT

NAT Working Group Holdrege INTERNET-DRAFT Communications Category: Informational Srisuresh

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-06-21 11:58:17
416Computer network security / Hacking / Cross-site request forgery / Cross-site scripting / Vulnerability / CVSS / Web application security / Phorum / JavaScript / Internet forum / HTTP cookie / Computer security

Phorum http://www.phorum.org/ Full Disclosure v5.2.20 Advisory: VoidSecDate: 21 April 2016

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2016-04-21 11:38:00
417Computer network security / Virtual private networks / Tunneling protocols / OpenVPN / Zeroshell / SSL-Explorer: Community Edition / SoftEther VPN

MOBILE VPN between OpenVPN and Zeroshell !" #

Add to Reading List

Source URL: digilander.libero.it

Language: English - Date: 2008-02-13 11:17:45
418Computer network security / CBRN defense / Emergency management / Radioactive contamination / Computer security / Threat

0 11 November 2012 Nieuwenhuizen EU FP 7 SPIRIT project concerning CBRE infrastructure protection

Add to Reading List

Source URL: www.iccss.eu

Language: English - Date: 2015-06-19 09:14:35
419Network architecture / Electronic voting / Server / Clientserver model / Communications protocol / Computer networking / Internet protocol suite / IMS security

Bilkent University Senior Design Project Smart-Vote: Electronic Voting System for Smartphones Department of Computer Engineering

Add to Reading List

Source URL: ivoteturkey.eu.pn

Language: English - Date: 2014-05-14 18:12:29
420Crime prevention / National security / Cryptography / Information governance / Cybercrime / Computer security / Internet privacy / National Security Agency / Network security

Network Security Activities Under the University’s Electronic Communications Policy This guidance is intended to assist the Campuses and Laboratories in undertaking additional network security efforts. This guidance sp

Add to Reading List

Source URL: security.ucop.edu

Language: English - Date: 2016-02-01 23:11:50
UPDATE