Computer network security

Results: 18127



#Item
571Computer network security / Hacking / Code audit / Information technology audit / Vulnerability / Cross-site scripting / SQL injection / Web application security / Code injection / Uncontrolled format string / Application security / Computer security

Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science Department

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2005-09-25 18:44:49
572Internet advertising / Internet marketing / Information privacy / Data Protection Directive / European Union / Online advertising / Behavioral targeting / Internet privacy / Web analytics / Computer security / FTC regulation of behavioral advertising / Network Advertising Initiative

IAB Europe EU Framework for Online Behavioural Advertising April 2011 Introduction

Add to Reading List

Source URL: meine-cookies.org

Language: English - Date: 2015-05-08 03:28:45
573Computer network security / Cyberwarfare / Data security / Firewall / Network management / IP address / Control panel / Comparison of firewalls

McAfee UTM Firewall Quick Installation Guide Rack Mount Model SG720

Add to Reading List

Source URL: go.mcafee.com

Language: English - Date: 2009-10-12 12:56:14
574Computer network security / IP address spoofing / Spoofing attack / Wireless security / Wireless LAN / ARP spoofing / MAC address / IEEE 802.11 / Spoof / Computer network / MAC filtering / Computer security

Protecting Wireless Networks from Identity Theft (Spoofing) using the spatial correlation of received signal strength. GudipudiChandanaTheja MTech Student Dapartment of Computer Science Engineering ST.Mary’s Gr oup of

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-13 08:43:06
575Computer access control / Computer network security / Virtual private networks / ESET / Internet privacy / Network architecture / Multi-factor authentication / Password / Authentication / One-time password / RADIUS / SoftEther VPN

Protect your VPN in 10 Minutes Looking to secure your VPN access in no time? ESET Secure Authentication gives your people super easy, secure access to your company network - from anywhere. Run The Installer ◆ Run the

Add to Reading List

Source URL: static5.esetstatic.com

Language: English - Date: 2014-02-19 03:58:22
576Cyberwarfare / Antivirus software / Computer network security / ESET / Computer security / Rootkit / Internet security / Malware / Botnet / Comparison of antivirus software

Making the Internet Safer for You to Enjoy Explore the great online, securely protected by ESET’s award-winning detection technology. It’s trusted by over 100 million users worldwide to detect and neutralize all typ

Add to Reading List

Source URL: cdn5-prodint.esetstatic.com

Language: English - Date: 2016-07-26 04:26:23
577Computer network security / Antivirus software / Server appliance / Computer virus / Malware / Avira / Zero-day / Check Point / Computer security

Check Point SandBlast Cloud CHECK POINT SANDBLAST CLOUD Industry-leading zero-day protection for Microsoft Office

Add to Reading List

Source URL: www.compugraf.com.br

Language: English - Date: 2016-06-06 13:54:57
578Cyberwarfare / First Responder Network Authority / International Multilateral Partnership Against Cyber Threats / Computer security / Next Generation 9-1-1 / Cyber-security regulation / New Jersey Cybersecurity and Communications Integration Cell

iCERT Industryy Council for Emergency Industr Response Technologies

Add to Reading List

Source URL: www.theindustrycouncil.org

Language: English - Date: 2016-05-23 17:14:30
579Piscataway /  New Jersey / Internet in China / China Internet Network Information Center / Malware / Zhongguancun / Internet / Computer security / Institute of Electrical and Electronics Engineers

Version: 29 June Contents

Add to Reading List

Source URL: internetinitiative.ieee.org

Language: English - Date: 2016-07-27 10:33:08
580Network architecture / Computer networking / OpenFlow / Computer network security / Internet Standards / Software-defined networking / Network address translation / Router / Firewall / Communications protocol / Computer network / Open vSwitch

Position Paper: Software-Defined Network Service Chaining Jeremias Blendin∗ , Julius R¨uckert∗ , Nicolai Leymann§ , Georg Schyguda§ , and David Hausheer∗ ∗ Peer-to-Peer Systems Engineering Lab, Technische Uni

Add to Reading List

Source URL: www.ps.tu-darmstadt.de

Language: English - Date: 2014-10-13 14:27:15
UPDATE