Computer network security

Results: 18127



#Item
551Computer security / Computer network security / Application security / Software testing / Application firewall / Mobile security / Fortify Software / Vulnerability / Software as a service

1 Issue 2 1 Seismic shift needed toward application security 2 Critical differentiator

Add to Reading List

Source URL: saas.hpe.com

Language: English - Date: 2015-09-16 16:49:11
552Computer network security / Crime prevention / Cryptography / Information governance / National security / Information security / Virtual private network / Email / Cisco Systems / Internet / Computer security / Phishing

Office of Information Technology (OIT) New Faculty Orientationoit.ua.edu myBama - The UA Portal

Add to Reading List

Source URL: provost.ua.edu

Language: English - Date: 2016-08-10 17:48:34
553Computer network security / Computer security / Cybercrime / National security / Antivirus software / Malware / Threat

Presentation Eric HOUDET Mission Statement: Quarkslab mission is to protect sensitive data for companies facing highly sophisticated cyber-attacks. Therefore, we provide

Add to Reading List

Source URL: www.nitec.nato.int

Language: English - Date: 2016-06-08 10:31:21
554Information technology management / National security / E-commerce / Computer network security / Computer security / Cryptography / Software / Business process management

Microsoft Word - This Time The Gathering Storm is Digital.doc

Add to Reading List

Source URL: ontopilot.com

Language: English - Date: 2016-03-21 13:58:05
555Spamming / Computer network security / Multi-agent systems / Cyberwarfare / Cybercrime / Bitcoin / Phishing / Computer security / ZeroAccess botnet / Botnet / IID / Command and control

MARKET INTELLIGENCE eCrime Trends Report: Fourth QuarterBroadway

Add to Reading List

Source URL: internetidentity.com

Language: English - Date: 2014-03-19 14:38:36
556Cyberwarfare / Computer network security / Multi-agent systems / Spamming / Cybercrime / Botnet / Sandvine / Denial-of-service attack / Computer security / Traffic classification

Protect your subscribers, services, and network from online threats Cyber Security

Add to Reading List

Source URL: www.sandvine.com

Language: English
557Network management / System administration / Crime prevention / National security / Secure communication / Logfile / Login / Syslog / Computer security / Security information and event management / Log analysis / Windows Security Log

PDF Document

Add to Reading List

Source URL: its.sjsu.edu

Language: English - Date: 2015-12-07 11:43:06
558Computer worms / Computer network security / Warhol worm / SQL Slammer / Computer security / Antibody

Design Space and Analysis of Worm Defense Strategies David Brumley Li-Hao Liu Pongsin Poosankam

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
559Computer network security / OpenVPN / Hotspot / Unified threat management / Virtual private network / Endian Firewall

Securing everyThing www.endian.com Endian Hotspot vs Endian UTM

Add to Reading List

Source URL: www.endian.com

Language: English - Date: 2016-02-24 12:15:03
560Energy economics / Home automation / Building automation / Environmental technology / Lighting / Efficient energy use / Lighting control system / Computer network / Energy policy / Computer security / Energy industry / Internet of things

Background Discussion for July 6 IEA Workshop on Digital Networks — www.iea.org/Textbase/events Buildings as Networks: Danger, Opportunity, and Guiding Principles for Energy Efficiency Alan Meier and Bruce Nordman1, L

Add to Reading List

Source URL: nordman.lbl.gov

Language: English - Date: 2007-11-15 16:35:32
UPDATE