Computer network security

Results: 18127



#Item
681Denial-of-service attacks / Flow control / Computer network security / Transmission Control Protocol / SYN flood / Denial-of-service attack / Port scanner / Acknowledgement / LAND / SYN cookies

An Accurate Sampling Scheme for Detecting SYN Flooding Attacks and Portscans ∗ Grenoble Maciej Korczy´nski∗ Lucjan Janowski† and Andrzej Duda∗

Add to Reading List

Source URL: mkorczynski.com

Language: English - Date: 2015-02-15 17:08:53
682Computer network security / Network architecture / Local area networks / Cloud infrastructure / Ethernet / OpenStack / Open vSwitch / Virtual LAN / Firewall / Network virtualization / Network address translation / Network switch

OpenStack networking for humans: symbolic execution to the rescue Radu Stoenescu, Dragos Dumitrescu, Costin Raiciu University Politehnica of Bucharest Email:

Add to Reading List

Source URL: nets.cs.pub.ro

Language: English - Date: 2016-05-10 04:52:03
683Computer network security / Virtual private networks / Tunneling protocols / Internet privacy / OpenVPN / Computer networking / Stateful firewall / Layer 2 Tunneling Protocol / Firewall / PfSense / SoftEther VPN

Your Next Open Source Firewall opnsense.org (cDeciso B.V., All Rights Reserved. [rev]

Add to Reading List

Source URL: www.deciso.com

Language: English - Date: 2016-05-23 06:46:56
684

BMCC INFORMATION SECURITY STANDARDS AND POLICIES Borough of Manhattan Community College is responsible for ensuring that its network and computer resources are safe from security breaches, to prevent the loss of nonpubl

Add to Reading List

Source URL: ccc.bmcc.cuny.edu

Language: English - Date: 2014-01-30 16:14:40
    685Computer network security / Wireless networking / Local area networks / Wi-Fi / IEEE 802.11 / Wi-Fi Protected Access / Protected Extensible Authentication Protocol / Wireless security / Comparison of wireless LAN clients

    Connecting to the Rovernet WPA2 Secured Wireless Network with Windows 7 Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements in order to conn

    Add to Reading List

    Source URL: www.it.mtu.edu

    Language: English - Date: 2015-09-21 08:47:24
    686Cybercrime / Cyberwarfare / Social engineering / E-commerce / Computer network security / Phishing / Denial-of-service attack / Computer security / Targeted threat / Bitcoin / Malware / Supply chain attack

    Financial Sector Threats 2015 Year in Review 1 Table of Contents

    Add to Reading List

    Source URL: info.digitalshadows.com

    Language: English - Date: 2016-06-14 16:59:05
    687Searches and seizures / Privacy of telecommunications / Computer network security / Cyberwarfare / Fourth Amendment to the United States Constitution / Electronic Communications Privacy Act / Search warrant / Patriot Act / Riley v. California / Probable cause / Search and seizure / Computer security

    Written Statement Of The Center for Democracy & Technology Before The Judicial Conference Advisory Committee on Criminal Rules

    Add to Reading List

    Source URL: cdt.org

    Language: English - Date: 2014-10-24 15:56:12
    688Computer security / Computing / Cyberwarfare / Hacking / Computer network security / Veracode / Application security / Cross-site scripting / Vulnerability / Cross-site request forgery / JavaScript / Web application security

    WHAT IS APPLICATION SECURITY? Every enterprise’s application landscape is now both business critical and rapidly expanding. “On our current

    Add to Reading List

    Source URL: www.veracode.com

    Language: English - Date: 2016-01-20 16:34:29
    689Cryptography / Computer network security / Computer security / Transport Layer Security / Cryptographic software / Vulnerability / FREAK / OpenSSL / Exploit / Attack / Common Vulnerabilities and Exposures / Shellshock

    Vulnerabilities At a glance Description A look into software vulnerabilities, whether we are

    Add to Reading List

    Source URL: www.kennasecurity.com

    Language: English - Date: 2016-04-26 13:43:51
    690Computer architecture / Computing / Computer network security / Microsoft Windows / Wireless networking / IEEE 802.11 / Cryptographic protocols / Wi-Fi Protected Access / Wi-Fi / Control Panel / Windows Vista / Wireless security

    Connecting to the Rovernet WPA2 Secured Wireless Network with Windows Vista Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements in order to

    Add to Reading List

    Source URL: www.it.mtu.edu

    Language: English - Date: 2015-09-21 08:47:24
    UPDATE