Computer network security

Results: 18127



#Item
611Tunneling protocols / Computer network security / Virtual private networks / OpenConnect

work IQ badges_PMS_COLORS

Add to Reading List

Source URL: www.oc.com

Language: English - Date: 2016-06-02 15:50:09
612Government procurement in the United States / United States administrative law / Computer security

IT-AAC FITARA Roadmap for Rapid Modernization of Legacy Network & IT Infrastructure Presented to Office of Management and Budget United States CIO & USDS

Add to Reading List

Source URL: www.it-aac.org

Language: English - Date: 2015-07-13 10:51:16
613Computer network security / Distance education / Educational psychology / Educational technology / Information technology / Internet access / Internet / Computer security / Computer network / Gogte Institute of Technology

HOOSICK FALLS CENTRAL SCHOOL DISTRICT Instructional Technology Plan

Add to Reading List

Source URL: www.hoosickfallscsd.org

Language: English - Date: 2016-05-20 07:58:27
614Computer network security / Software testing / Computer security / Hacking / OWASP / Penetration test / Vulnerability / Web application security / HP Application Security Center

Statement of Information Security Assessment May 2016 CosmoLex Cloud LLC 201 No. Center Drive North Brunswick NJ 08902

Add to Reading List

Source URL: www.cosmolex.com

Language: English - Date: 2016-06-02 13:51:42
615Multihoming / Internet protocols / OSI protocols / Transmission Control Protocol / Identifier/Locator Network Protocol / Communications protocol / IP address / Transport layer

Identity and Location: implications for Security, Privacy and Resilience Saleem Bha) School of Computer Science University of St Andrews

Add to Reading List

Source URL: saleem.host.cs.st-andrews.ac.uk

Language: English - Date: 2016-04-07 10:42:21
616Computer network security / Cyberwarfare / E-commerce / Data security / Firewall / Network management / Computer security / Security hacker / Computer virus / Information technology / Computer

Center for Information Technology 1 History  The Center, initially called the Computer Center, was founded in 1974 for information processing education. In 1997, it was reorganized into the Center for Information Tec

Add to Reading List

Source URL: www.oita-ct.ac.jp

Language: English - Date: 2013-03-17 05:50:55
617Payment systems / E-commerce / Cybercrime / Webmail / Computer network security / Computer security / Password / Credit card / Outlook.com / Alternative payments / Online wallet

A guide to St. Columba’s online database Member Portal 4201 Albemarle Street NW, Washington, DC4119 n FAXn Columba.org

Add to Reading List

Source URL: www.columba.org

Language: English - Date: 2012-03-02 13:49:16
618Cybercrime / National security / Computer network security / Computer security / Cryptography / Cyberwarfare / Internet / Simulation / Cyber-attack / Social networking service / Cyber-physical system / Scalable Network Technologies

Advanced Tools for Cyber Ranges Timothy M. Braje In response to the growing number and variety of cyber threats, the government, military, and

Add to Reading List

Source URL: www.ll.mit.edu

Language: English - Date: 2016-07-12 14:37:39
619Secure communication / Cyberwarfare / Computer network security / E-commerce / Data security / Computer security / Data breach / Crimeware / Vulnerability / Denial-of-service attack / Supply chain attack / Database activity monitoring

2016 Data Breach Investigations Report—Executive SummaryData Breach Investigations Report

Add to Reading List

Source URL: www.verizonenterprise.com

Language: English - Date: 2016-06-13 20:00:00
620Cybercrime / Antivirus software / Computer network security / E-commerce / Computer security / Secure communication / Phishing / Computer worm / Malware / Trusteer / Kaspersky Lab

the importance of layered security_fin-01

Add to Reading List

Source URL: pl.malwarebytes.com

Language: English - Date: 2016-07-07 13:05:33
UPDATE