Computer network security

Results: 18127



#Item
481Access control / Computer access control / Extensible Authentication Protocol / Wireless networking / Identity management / Computer network security / Authentication protocol / Authentication / Near field communication / Protected Extensible Authentication Protocol / IEEE 802.1X

Microsoft Word - Self-Authenticable WD_final.docx

Add to Reading List

Source URL: www.ciee.org.tw

Language: English - Date: 2015-07-30 06:16:01
482Cyberwarfare / Cybercrime / National security / E-commerce / Computer network security / Computer security / United States Computer Emergency Readiness Team / SCADA / Cyber-attack / ISAC

TLP: White Analysis of the Cyber Attack on the Ukrainian Power Grid Defense Use Case

Add to Reading List

Source URL: ics.sans.org

Language: English - Date: 2016-03-22 09:34:19
483Avionics / Air traffic control / Warning systems / Computer network security / Aircraft collision avoidance systems / Traffic collision avoidance system / Automatic dependent surveillance  broadcast / Secondary surveillance radar / Computer security / Wireless security / Aviation accidents and incidents / Aviation safety

CyCon_2016_book_sisu.indd

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2016-08-02 08:53:24
484Computer network security / Server appliance / Crime prevention / Cryptography / National security / Check Point / Cloud computing / Computer security / Check Point Integrity

Microsoft PowerPoint - R80_customer_deck_Feb2016 [Read-Only]

Add to Reading List

Source URL: www.cikom.com

Language: English - Date: 2016-04-14 07:06:08
485Tunneling protocols / Point-to-Point Tunneling Protocol / Internet protocols / Internet Standards / Virtual private networks / Computer network security / Layer 2 Tunneling Protocol / Point-to-Point Protocol daemon

Microsoft Word - Configure PPTP Server.doc

Add to Reading List

Source URL: www.zeroshell.net

Language: English - Date: 2011-12-28 16:45:38
486Crime prevention / Cryptography / Information governance / National security / Computer network security / Digital mailroom / Computer security / Server / F-Secure / FTPS / Client honeypot

OVEANA Global Business Services 123 W. Mills Avenue, Suite 400 El Paso, TXDigital Imaging Servicing Level

Add to Reading List

Source URL: www.ccg.state.tx.us

Language: English - Date: 2014-08-25 16:38:45
487Computer security / Data security / Computer network security / Cryptography / National security / Security controls / Information security / National Institute of Standards and Technology / Vulnerability

Independent Security Assessment Criteria Phase – I Version 1.1, datedFor: {Organization name} Performed on: {Date of Assessment}

Add to Reading List

Source URL: www.calguard.ca.gov

Language: English - Date: 2016-07-18 16:29:13
488Cloud infrastructure / Data management / Cloud storage / Data centers / Computer networking / Cloud computing / Infrastructure optimization / Provisioning / Storage area network / Computer security / Dynamic infrastructure / IBM cloud computing

Data Center arrow.com The data center. Few people ever see it, but precious little of consequence happens without passing through it.

Add to Reading List

Source URL: www.fiveyearsout.com

Language: English - Date: 2016-08-12 12:28:45
489Cybercrime / National security / Computer network security / Crime prevention / Cryptography / National Transportation Communications for Intelligent Transportation System Protocol / Computer security / Safety / Outline of computer security / Wireless security

CyberSecurity Facts to Know

Add to Reading List

Source URL: www.econolite.com

Language: English - Date: 2016-02-19 05:24:25
490Computer network security / Key management / Authentication protocols / Kerberos / Key distribution center / Ticket Granting Ticket / Ticket / Shared secret / NT LAN Manager / Authentication server

-- -- The Evolution of the Kerberos Authentication Service John T. Kohl

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2004-04-08 15:18:56
UPDATE