Computer network security

Results: 18127



#Item
631E-commerce / Computer security / Computer network security / National security / Cryptography / Vulnerability / Intel Security / Threat / Attack / Malware / Payment Card Industry Data Security Standard / Security

Whitepaper The cost of ignoring malware: How attention to the basics can protect your organization from damaging attacks It’s not enough for an organization to

Add to Reading List

Source URL: www.nttsecurity.com

Language: English - Date: 2016-07-26 13:04:46
632Network management / Internet protocols / Computer network security / Network performance / NetFlow / IP Flow Information Export / Measuring network throughput / Traffic flow / Communications protocol / Packet analyzer / Pcap / Transport layer

Aggregation of Network Protocol Data Near its Source Marcel Fourn´e, Kevin Stegemann, Dominique Petersen, and Norbert Pohlmann Institute for Internet Security, Westf¨ alische Hochschule, University of Applied Sciences,

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 12:55:58
633Internet protocols / Cryptography / Schengen Routing / Internet Standards / Computer network security / Internet privacy / Schengen Area / Internet / Border Gateway Protocol / Routing / European integration / IPsec

Secure communication and digital sovereignty in Europe Norbert Pohlmann . Michael Sparenberg . Illya Siromaschenko . Kilian Kilden Institute for Internet Security – if(is) Westfälische Hochschule, Gelsenkirchen

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-12-20 07:45:16
634Information privacy / Payment cards / E-commerce / Computer law / Payment Card Industry Data Security Standard / Cryptography / Payment card industry / Information security / Network segmentation / PA-DSS / Conventional PCI / Tokenization

Microsoft Word - pci_dss_v1-2.doc

Add to Reading List

Source URL: www.pcidss.ru

Language: English - Date: 2013-11-15 09:18:13
635Antivirus software / Computer network security / Cyberwarfare / ESET / Malware / David Harley / Computer virus / Sality / Stuxnet / Computer security / Internet security / Avira

March 2015 Feature Article: 50 Shades of Security Table of Contents 50 Shades of Security .................................................................................................................................

Add to Reading List

Source URL: virusradar.com

Language: English - Date: 2015-06-02 02:58:26
636Computer network security / Fortinet / Computer security / Firewall / Virtual private network / Security / Network switch / Image segmentation / Software-defined protection / Virtual security switch

WHITE PAPER Internal Segmentation Firewall Security Where You Need It, When You Need It.

Add to Reading List

Source URL: www.fortinet.com

Language: English - Date: 2016-08-15 19:28:38
637Internet of Things / Ambient intelligence / Computer security / Smart manufacturing / Gateway / Machine to machine / Smart city / Cloud computing / Smart meter / Jasper Technologies / Sigfox

Network of people and things diag

Add to Reading List

Source URL: www.ey.com

Language: English - Date: 2015-07-29 10:16:25
638Wireless networking / Bluetooth / Wireless / Computer network security / Computer network / Computer security / Microsoft Kin / Wi-Fi / Bluesnarfing

LoKI: Location-based PKI for Social Networks Randy Baden University of Maryland http://www.cs.umd.edu/~randofu/loki

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2011-08-01 22:51:40
639Cyberwarfare / Cryptography / Crime prevention / National security / Computer network security / Dropper / Denial-of-service attack / Backdoor / Intel / Computer security / Malware / Recreational Software Advisory Council

SESSION ID: SPO1-T09 Christiaan Beek Disrupting Adversarial Success— Giving the Bad Guys No Sleep

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2016-02-28 09:30:14
640Computer network security / Computer security / Software architecture / Data security / Web application security / Firewall / Application security / Web application / Application firewall / Application server

Microsoft PowerPoint - ISSA Dallas Presentation.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:23
UPDATE