Computer network security

Results: 18127



#Item
651Software testing / Computer network security / Hacking / Vulnerability / GrammaTech / Computer security

Securely Taking on New Executable Software of Uncertain Provenance (STONESOUP) Neutralizing Exploitable Vulnerabilities in Software Program Manager: Mr. W. Konrad Vesey; E-mail: How can we benefit

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2015-10-27 14:35:32
652Network management / Internet Standards / Internet protocols / System administration / Computer systems / Syslog-ng / Syslog / Balabit / Logfile / Log management / Log analysis / Information technology security audit

syslog-ng Store Box PRODUCT DESCRIPTION CopyrightBalaBit IT Security All rights reserved.

Add to Reading List

Source URL: log-management.it

Language: English - Date: 2014-05-07 13:40:47
653Computer network security / Software testing / Hacking / Computer security / Veracode / Common Weakness Enumeration / Vulnerability / Application security / Security testing / Software quality / CVSS / Software bug

Veracode Summary Report Summary Report As of 18 Mar 2016 Prepared for: Prepared on:

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2016-04-06 15:04:57
654Computer security / Hacking / Software testing / Computer network security / Attack patterns / Recommender system / Text mining / Event correlation / Data mining / CAPEC / Intrusion detection system / Information security operations center

Mining known attack patterns from security-related events Nicandro Scarabeo1,2 , Benjamin C.M. Fung3 and Rashid H. Khokhar4 1 Department of Electrical and Information Engineering, University of Cassino and Southern Lazi

Add to Reading List

Source URL: peerj.com

Language: English - Date: 2015-10-07 04:49:41
655Cybercrime / National security / Videotelephony / Computer network security / Computer security / Cryptography / Email / Samsung Electronics / Samsung / Outlook.com / Canning

Microsoft Word - Session on 28 May 15.doc

Add to Reading List

Source URL: www.redas.com

Language: English - Date: 2015-05-17 22:11:21
656Proprietary software / Rogue software / Antivirus software / Computer network security / Identity theft / Spyware / Spybot  Search & Destroy / Microsoft Windows / Norton AntiVirus / Internet Explorer / Windows Vista

Personal InnoVia User Manual 3rd Edition

Add to Reading List

Source URL: www.ntreis.net

Language: English - Date: 2011-08-12 12:06:45
657Building automation / Sustainable urban planning / Computer security / Wi-Fi / Internet privacy / Efficient energy use / Computer network

Using Existing* Networks For Energy Purposes Bruce Nordman, Alan Meier October 7, 2009 (*”existing” can be either those already in place today, or those installed in future for non-energy purposes) Much activity in e

Add to Reading List

Source URL: nordman.lbl.gov

Language: English - Date: 2011-10-17 19:46:05
658Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
659Computer network security / Computer security / Hacking / Software testing / Vulnerability / Application security / Web application firewall

Microsoft PowerPoint - VulnerabilityManagementInAnApplicaitonSecurityWorld_SnowFROC_20090305.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:46
660Network architecture / Computer network security / Cryptographic protocols / Network protocols / Computer networking / 6WIND / Data Plane Development Kit / Open vSwitch / IPsec / Internet Key Exchange / Virtual private network / NAT traversal

TurboIPsec TM COTS Based IPsec VPN Solution With Scalable Performance

Add to Reading List

Source URL: www.6wind.com

Language: English - Date: 2016-07-25 19:28:57
UPDATE