Computer network security

Results: 18127



#Item
721Computer security / Computer access control / Security / Cyberwarfare / Identity theft / Cybercrime / Computer network security / Internet advertising / Spyware / Password / Multi-factor authentication / Phishing

Tips on Online Security Security Practices to Safeguard Your Password You are advised to adopt the following:   

Add to Reading List

Source URL: secure.ifastpensions.com

Language: English - Date: 2014-09-25 08:27:41
722Security / Cyberwarfare / Computer security / Computer network security / Cryptography / National security / Secure communication / Information security management system

Paris, February 11, 2016 Press release: Beijaflore has got the ISOcertification for the whole company By obtaining the ISO/IEC 27001:2013 certification for the whole Group, Beijaflore becomes the first and only

Add to Reading List

Source URL: www.beijaflore.com

Language: English - Date: 2016-02-18 12:28:33
723Ethernet / NetFlow / Computing / Network switch / System software / Information technology management / Local area networks / Network management / Computer network security

Distributed Computing Prof. R. Wattenhofer Classifying Usage of LAN Ports In recent years, technologies such as

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2015-12-23 06:49:21
724Computing / Technology / Network protocols / Wireless networking / Networking hardware / Computer network security / Port forwarding / Routing / Universal Plug and Play / Wi-Fi / Ethernet / Router

LS-PTC300 CAMERA MANUAL Hardware Installation 1) Insert the power cable and the Wi-Fi antenna into their respective ports on the camera. Tighten the Wi-Fi antenna until it is secure and not loose. 2) Insert one end of t

Add to Reading List

Source URL: www.lockstate.com

Language: English - Date: 2015-04-30 17:25:58
725

IJCSNS International Journal of Computer Science and Network Security, VOL.15 No.7, JulyAutomata Designs for Data Encryption with AES using the Micron Automata Processor

Add to Reading List

Source URL: paper.ijcsns.org

Language: English - Date: 2015-08-04 07:51:20
    726Cybercrime / Computing / Security / Structure / National security / Social engineering / Cyberwarfare / Computer network security / Computer security / Phishing / Smart city / Sharing economy

    I SSUE 32 WELCOME THE JOURNAL FOR CHANGE LEADERS W

    Add to Reading List

    Source URL: www.impactexecutives.com

    Language: English - Date: 2016-04-18 11:59:42
    727Computing / Cyberspace / Cybercrime / Hacker culture / Technology / E-commerce / Hacking / Computer network security / Spamming / Computer security / Hacker

    Basic WordPress Security It all depends on you About Me

    Add to Reading List

    Source URL: wpsecurityworkshop.com

    Language: English - Date: 2016-05-14 22:10:06
    728Cryptography / Computer network security / Wireless networking / Local area networks / Cryptographic protocols / IEEE 802.11 / Wi-Fi Protected Access / Wireless security / GlobalSign / Root certificate / Cracking of wireless networks

    Connecting to the Rovernet WPA2 Secured Wireless Network with UbuntuHardy Heron) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements

    Add to Reading List

    Source URL: www.it.mtu.edu

    Language: English - Date: 2015-09-21 08:47:24
    729Computing / Information technology / Data management / Radio-frequency identification / Database / Data architecture / Computer security / Internet of things / Interoperability / Embedded system / Wireless sensor network / Data warehouse

    Challenges of Secure and Reliable Data Management in Heterogeneous Environments Norbert Siegmund, Janet Feigenspan, Michael Soffner, Jana Fruth, Veit Köppen Otto-von-Guericke University Magdeburg, Germany {nsiegmun, fe

    Add to Reading List

    Source URL: wwwiti.cs.uni-magdeburg.de

    Language: English - Date: 2011-03-23 13:27:55
    730Computing / Cyberwarfare / Computer network security / Computer security / Cybercrime / Spamming / Internet security / Zero-day / Phishing / Computer virus / Syslog / Client honeypot

    Appliance X1 xorlab AG c/o ETH Zürich Universitätsstrasse 6

    Add to Reading List

    Source URL: www.xorlab.com

    Language: English - Date: 2016-03-11 01:09:00
    UPDATE