Computer network security

Results: 18127



#Item
541Computer network security / Cyberwarfare / Cybercrime / Computer security / E-commerce / Man-in-the-browser / Denial-of-service attack / Internet security / Password / Threat / Web application firewall / Threat Intelligence Platform

ShapeAdvancedAppDefense_DataSheet

Add to Reading List

Source URL: www.shapesecurity.com

Language: English - Date: 2016-08-12 14:49:28
542National security / Computer network security / Computer security / Crime prevention / Cryptography / Cyberwarfare / Airport / State Secretariat of Civil Aviation / Directorate General of Civil Aviation

Presentation on Aviation Sector to Stakeholders-PDF

Add to Reading List

Source URL: aviation.gov.ng

Language: English
543Computer forensics / FireEye / Cyberwarfare / Computer network security / Data security / Secure communication / Security information and event management / Computer security / Cloud computing / Network tap

THREAT ANALYTICS PLATFORM: CLOUD COLLECTOR EVENT GENERATOR THAT SECURELY CREATES AND STREAMS EVENT DATA TO THE FIREEYE THREAT ANALYTICS PLATFORM (TAP) OV E R V I E W

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2016-06-24 18:23:18
544Computer security / Cybercrime / Cyberwarfare / National security / Computer network security / Commission on Enhancing National Cybersecurity / International Multilateral Partnership Against Cyber Threats / Cyber-security regulation / National Cybersecurity Center of Excellence

Commission on Enhancing National Cybersecurity Meeting Minutes June 21, 2016 Commission on Enhancing National Cybersecurity Established by Executive Order 13718,

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2016-07-27 11:48:29
545E-commerce / Computer network security / Computer security / Cryptography / National security / Secure communication / Insurance

Town of Burgaw Application for Utilities BUSINESS APPLICATION Business Name:___________________________________________________________ Service Address:__________________________________________________________ Mailing A

Add to Reading List

Source URL: www.townofburgaw.com

Language: English - Date: 2013-08-29 12:03:23
546Computer network security / Cryptographic protocols / Computer configuration / Control Panel / Button / Taskbar / Wi-Fi Protected Access

Troubleshooting Guide for KSU WiFi on Windows 8 Page 1 of 3 1. From the Start screen, place the mouse cursor in the bottom right corner.

Add to Reading List

Source URL: uits.kennesaw.edu

Language: English - Date: 2015-11-25 10:43:49
547Computer network security / Virtual private networks / Tunneling protocols / Network architecture / Internet privacy / Point-to-Point Tunneling Protocol / SoftEther VPN / UT-VPN

ITSC Services User Guide – VPN - For Mac users VPN - For Mac users Follow the steps below to set up a PPTP VPN connection on Mac OSX: Step 1.

Add to Reading List

Source URL: itsc.hsmc.edu.hk

Language: English - Date: 2016-06-07 04:32:13
548Computing platforms / Arxan Technologies / Cyberwarfare / Computer network security / .NET Framework / Malware / Computer security / Proprietary software / Cross-platform / Obfuscation / Software / Windows XP

Protecting .NET Software Applications Arxan Best Practices White Paper Arxan Technologies White Paper – Arxan protects your IP from software piracy, tampering, reverse engineering and any manner of theft. 1

Add to Reading List

Source URL: www.arxan.com

Language: English - Date: 2016-08-01 23:55:30
549Cyberwarfare / Actuarial science / Computer security / Management / Computer network security / Open Trusted Technology Provider Standard / Huawei / Supply chain / Risk management / NIST Cybersecurity Framework / Threat / Risk

The Global Cyber Security Challenge It is time for real progress in addressing supply chain risks Andy Purdy USA Cyber Security Officer Huawei Technologies

Add to Reading List

Source URL: www-file.huawei.com

Language: English - Date: 2016-06-17 02:52:23
550News aggregators / Computer network security / Mozilla / Firefox / Vulnerability / Patch Tuesday / Zero-day / Internet Explorer / Malware / Adobe Flash Player / Patch / Internet Explorer 6

Vulnerability Update AugustOctober 2015

Add to Reading List

Source URL: media.flexerasoftware.com

Language: English - Date: 2016-02-24 13:30:42
UPDATE