Computer network security

Results: 18127



#Item
621ESET / Botnets / Computer network security / Multi-agent systems / Spamming / Sality / AutoRun / Antivirus software / David Harley / Computer virus / Malware / Furby

September 2015 Feature Article: Watching the Furby Fly Table of Contents Watching the Furby Fly............................................................................................................................

Add to Reading List

Source URL: virusradar.com

Language: English - Date: 2015-10-06 04:42:51
622Cybercrime / Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Email / Registrar

SCHOOL SAFETY AND SECURITY SEMINAR From Operations to Culture: SAFETY IMPACTS LEARNING

Add to Reading List

Source URL: iasb.mys1cloud.com

Language: English - Date: 2016-08-16 11:39:18
623Computer network security / Cyberwarfare / Spamming / Computer security / Honeypot / OpenSSL / Honeynet Project / WU-FTPD / Exploit / Batch file / Wget / Denial-of-service attack

honeypot intelligence “Honeynets: High V alue Security Data” A nton C huv ak in, P h.D., G C IA . G C IH A nalysis of real attack s launched at a honeyp ot

Add to Reading List

Source URL: www.chuvakin.org

Language: English - Date: 2005-12-06 00:28:20
624Crime prevention / Computer network security / Computer security / Cryptography / Cyberwarfare / National security

NOTIFICATION AND RELEASE Sales Representative Brian Shaver Company Name Virginia Western Community College Access ID

Add to Reading List

Source URL: www.virginiawestern.edu

Language: English - Date: 2016-02-26 16:05:45
625Cyberwarfare / Denial-of-service attacks / Computer network security / Internet Relay Chat / Cybercrime / DDoS mitigation / Denial-of-service attack / Botnet / Computer security

T HESIS FOR THE D EGREE OF DOCTOR OF PHILOSOPHY Multifaceted Defense Against Distributed Denial of Service Attacks: Prevention, Detection, Mitigation

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2012-08-22 04:55:54
626Cyberwarfare / Computer network security / Hacker culture / Hacking / Cybercrime / Security hacker / Computer security / Rootkit / Hackers: Heroes of the Computer Revolution / Internet security / Firewall / Hacker

Teaching the Principles of the Hacker Curriculum to Undergraduates Sergey Bratus Anna Shubina

Add to Reading List

Source URL: www.ists.dartmouth.edu

Language: English - Date: 2010-01-25 17:05:27
627Computer security / Data security / Computer network security / Security controls / Security / Information security / Information technology controls / Information technology audit / Vulnerability / Audit / Professional certification / ISO/IEC JTC 1/SC 27

Microsoft Word - NISTRev 4 Information Security Assessment Template (v2016.1)

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:18:08
628Crime prevention / Cryptography / Information governance / National security / Data security / Computer security / Backup / Internet / Android / Cloud computing / Computer network / Bring your own device

Document Type Doc ID Status

Add to Reading List

Source URL: www.astrazeneca.com

Language: English - Date: 2016-01-07 16:03:32
629Cryptographic protocols / Computer network security / IEEE 802.11 / Wireless networking / Wi-Fi Protected Access / 11i / Broadband

I N T U I C O M BroadBand Solutions 2.4GHzGHz BROADBAND SPECIFICATIONS K E Y F E AT U R E S

Add to Reading List

Source URL: www.econolite.com

Language: English - Date: 2016-02-19 05:24:26
630Vexillology / Flags / Capture the flag / Computer network security / Reduction

Automatic Problem Generation for Capture-the-Flag Competitions Jonathan Burket Carnegie Mellon University Peter Chapman

Add to Reading List

Source URL: jburket.com

Language: English - Date: 2015-08-11 15:26:34
UPDATE