Computer network security

Results: 18127



#Item
661Internet Standards / Internet protocols / Routing protocols / Public-key cryptography / Computer networking / Resource Public Key Infrastructure / IP hijacking / Content delivery network / Border Gateway Protocol / Domain Name System Security Extensions / IP address / OpenDNS

RiPKI: The Tragic Story of RPKI Deployment in the Web Ecosystem Matthias Wählisch Robert Schmidt

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2015-10-23 03:22:22
662Hypertext Transfer Protocol / Cross-site request forgery / Internet privacy / JavaScript / Ajax / Computer network security / Same-origin policy / Cross-site scripting / HTTP cookie / Referer spoofing / Session fixation / XMLHttpRequest

Robust Defenses for Cross-Site Request Forgery Adam Barth Collin Jackson Stanford University

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2008-10-31 13:52:34
663Computer network security / Cybercrime / Computer security / Cryptography / Cyberwarfare / National security / Password / Email / Mobile computing / Internet / Server / Greek Orthodox Archdiocese of America

General Policy and Procedure on Technology Prepared by the Office of Information Technology AprilAdopted by Administrative Council June 7, 2010)

Add to Reading List

Source URL: www.arch-no.org

Language: English - Date: 2014-06-19 13:44:40
664Computer network security / Cyberwarfare / Computer security / Data security / Secure communication / Virtual firewall / Security / Firewall / Threat

Securing Your Digital Transformation Driving Digital Business Securely The only effective approach to security is a

Add to Reading List

Source URL: www.uk.logicalis.com

Language: English - Date: 2016-06-07 06:11:39
665Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
666Computer network security / Cyberwarfare / Denial-of-service attacks / Netfilter / Iptables / SYN cookies / Transmission Control Protocol / Denial-of-service attack / Tc / Firewall / SYN flood / Stateful firewall

DDoS protection Using Netfilter/iptables Jesper Dangaard Brouer Senior Kernel Engineer, Red Hat Network-Services-Team

Add to Reading List

Source URL: people.netfilter.org

Language: English - Date: 2014-02-08 09:46:20
667Computer network security / Cyberwarfare / Data security / Firewall / Network management / Computer security / Security Target / Guard / Common Criteria

Microsoft WordSertit 012 Maintenance Report v_5.0

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2015-07-03 04:33:47
668Hacking / Software testing / Computer network security / Vulnerability / Cross-site scripting / Computer security / SQL injection

WHITEHAT SENTINEL SOURCE FOR MOBILE DA T A SHE E T WhiteHat Sentinel Source for Mobile

Add to Reading List

Source URL: www.whitehatsec.com

Language: English - Date: 2016-08-17 13:22:10
669Computer network security / Multi-agent systems / Spamming / Botnets / United States v. Nosal / Computer Fraud and Abuse Act / Zombie / Computer worm / Mariposa botnet / Conficker / Rustock botnet / Srizbi botnet

Testimony of Amie Stepanovich  Senior Policy Counsel, Access  on behalf of   Access and the Electronic Frontier Foundation  Before the Advisory Committee on Criminal Rules  on the Matter of P

Add to Reading List

Source URL: www.accessnow.org

Language: English - Date: 2015-09-14 16:04:23
670Software testing / Computer network security / Computer security / Penetration test / Vulnerability / Exploit / Attack / 0D

Intelligence Driven Security We are searching, with immediate effect, for highly motivated and technically competent Penetration Tester Red Teamer

Add to Reading List

Source URL: www.code-white.com

Language: English - Date: 2016-02-15 10:50:39
UPDATE