Computer network security

Results: 18127



#Item
741Computer security / Security / Computing / Cyberwarfare / Computer network security / Cybercrime / National security / Actuarial science / Situation awareness / International Multilateral Partnership Against Cyber Threats / Threat / Risk

Aviation Cybersecurity Roadmap Research needs Cyrille Rosay Senior Expert Avionics – Cyber Security Certification Directorate

Add to Reading List

Source URL: www.aerodays2015.com

Language: English - Date: 2015-11-03 04:29:29
742Computing / Internet / Internet privacy / Internet censorship / Computer network security / Human rights in China / Internet in China / Internet censorship in China / Deep packet inspection / Tor / IP address / Proxy server

The Great Firewall of China How It Blocks Tor and Why It Is Hard to Pinpoint P h i l i pp W i n t e r a n d J e d i d i a h R . C r a n d a l l Philipp Winter is a PhD student

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2015-12-06 01:04:28
743Computer security / Cyberwarfare / Computing / Hacking / Computer network security / Software testing / Vulnerability / CERT Coordination Center / Cross-site scripting / SQL injection / CVSS / Benjamin Kunz Mejri

Reporting Status of Vulnerability-related Information about Software Products and Websites - 1st Quarter ofJanuary – March) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency Res

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2016-05-31 02:00:13
744Hacking / Computer network security / Computer security / Veracode / Application security / Cross-site scripting / Vulnerability / Cross-site request forgery / JavaScript / Web application security

WHAT IS APPLICATION SECURITY? Every enterprise’s application landscape is now both business critical and rapidly expanding. “On our current

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2016-01-20 16:34:29
745Computing / Computer architecture / Computer network security / Wireless networking / IEEE 802.11 / Local area networks / Cryptographic protocols / Wireless / Wi-Fi Protected Access / Protected Extensible Authentication Protocol / Ubuntu / Cracking of wireless networks

Connecting to the Rovernet WPA2 Secured Wireless Network with with UbuntuIntreped Ibex) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requir

Add to Reading List

Source URL: www.it.mtu.edu

Language: English - Date: 2015-09-21 08:47:24
746Security / Computing / Computer security / Prevention / Cyberwarfare / Computer network security / Cryptography / National security / Bug bounty program / Vulnerability / Lavasoft / Application security

EVAN RICAFORT Address: Prk. Orchids, Poblacion, Ipil Zamboanga Sibugay, Zamboanga Del Sur 7000 | Email: | Mobile: + | Website: www.evanricafort.com SUMMARY

Add to Reading List

Source URL: evanricafort.com

Language: English - Date: 2016-01-21 13:11:11
747Engineering / Security / Technology / Emerging technologies / Computer network security / Avionics / Robotics / Unmanned aerial vehicle / Wireless / Computer security / Automation / Accelerometer

Microsoft Word - Control Lists 2nd ReviewFinal) - Registeration Number Incorporated

Add to Reading List

Source URL: www.mofa.gov.pk

Language: English - Date: 2015-07-02 03:04:03
748Security / Prevention / Cyberwarfare / Computer security / National security / Computer network security / Crime prevention / Cryptography / Threat / Cyber threat intelligence / Cyber-attack / Information security

The Importance of Cyber Threat Intelligence to a Strong Security Posture Sponsored by Webroot Independently conducted by Ponemon Institute LLC Publication Date: March 2015

Add to Reading List

Source URL: webroot-cms-cdn.s3.amazonaws.com

Language: English - Date: 2016-02-25 11:51:52
749Computing / Software / Cyberspace / Spamming / Social networking services / Computer network security / Cybercrime / E-commerce / Twitter / Vulnerability / Computer security / Botnet

A Categorization Scheme for Socialbot Attacks In Online Social Networks Silvia Mitter Knowledge Technologies Institute Graz University of Technology, Austria

Add to Reading List

Source URL: claudiawagner.info

Language: English - Date: 2013-08-25 09:03:46
UPDATE