Computer network security

Results: 18127



#Item
671Computer network security / Authentication protocols / BitLocker / Disk encryption / Windows 7 / Windows Server / Password / Kerberos

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
672Computer network security / Cross-platform software / FileZilla / Portable software / Password / Virtual private network / Outlook.com

How to get an access to the Main Storage System dapadfs Projects inside DAPA DAPA offer two different solutions for store data related to ongoing projects.  

Add to Reading List

Source URL: dapa.ciat.cgiar.org

Language: English - Date: 2015-02-20 09:16:32
673Crime prevention / National security / Cyberwarfare / Computer network security / Malware / Computer security / Mobile security

MAIK MORGENSTERN / CTO AV-TEST AVAR CONFRENCE 2015 YOU ARE THE TARGET IN THE IOT

Add to Reading List

Source URL: www.av-test.org

Language: English - Date: 2016-04-18 07:40:14
674Computer network security / Middlebox / Data-flow analysis / Scope / Transmission Control Protocol / Robust random early detection / ALGOL 68 / Subroutine / Parameter / Algorithm

Paving the Way for NFV: Simplifying Middlebox Modifications using StateAlyzr Junaid Khalid, Aaron Gember-Jacobson, Roney Michael, Anubhavnidhi Abhashkumar, Aditya Akella University of Wisconsin-Madison Abstract

Add to Reading List

Source URL: opennf.cs.wisc.edu

Language: English - Date: 2016-02-29 22:59:54
675Computer network security / Crime prevention / National security / E-commerce / Secure communication / Computer security / Vulnerability / Software

Microsoft PowerPoint - DenimGroup_RollingOutAnEnterpriseSourceCodeReviewProgram_Content.pptx

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:49
676Computer network security / Reputation management / Sybil attack / Yelp / Sibyl / Sybil

Strength in Numbers: Robust Tamper Detection in Crowd Computations Bimal Viswanath MPI-SWS

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2015-09-11 18:12:25
677Internet privacy / Dark web / Cryptographic software / Secure communication / Crypto-anarchism / Onion routing / Tor / I2P / Overlay network / Degree of anonymity / Mixminion / Routing

On Building Onion Routing into Future Internet Architectures⋆ Daniele E. Asoni, Chen Chen, David Barrera, and Adrian Perrig Network Security Group Department of Computer Science ETH Z¨urich

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2016-02-29 10:24:01
678Cyberwarfare / Computer network security / Computer security / Cryptography / National security / Secure communication / Software as a service

SBN-265 FOUNDED 2005 A full-service Information Technology consulting firm with core competencies in custom

Add to Reading List

Source URL: www.sbnonline.com

Language: English - Date: 2016-07-14 10:38:25
679Cybercrime / Computer security / Computer network security / Cryptography / National security / Vulnerability / Email / International cybercrime

FAB_BusinessArticles_Employees

Add to Reading List

Source URL: www.firstamb.net

Language: English - Date: 2014-03-25 14:31:21
680Wireless networking / Computer network security / Protected Extensible Authentication Protocol / IEEE 802.1X / RADIUS / WiMAX / Lightweight Extensible Authentication Protocol / Extensible Authentication Protocol

Aradial RADIUS AAA Server Aradial RADIUS AAA Server Affordable, easy to deploy and operate. High performance, availability and reliability%).

Add to Reading List

Source URL: www.aradial.com

Language: English - Date: 2010-05-10 11:58:17
UPDATE