Computer network security

Results: 18127



#Item
751Computer network security / Cryptographic protocols / Wi-Fi / IEEE 802.11 / Wireless networking / Wi-Fi Protected Access / IEEE 802.1X / IEEE 802.11i-2004 / AirPort / Wireless security / Cracking of wireless networks

Connecting to the Rovernet WPA2 Secured Wireless Network with the Mac OS XTiger) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements

Add to Reading List

Source URL: www.it.mtu.edu

Language: English - Date: 2015-09-21 08:47:24
752Computing / Internet / Network architecture / Secure communication / Internet Standards / Internet security / Computer network security / Internet protocols / SoftEther VPN / Tor / HTTPS / Transport Layer Security

Examining How the Great Firewall Discovers Hidden Circumvention Servers Roya Ensafi David Fifield

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2015-09-25 08:38:52
753Computer security / Cyberwarfare / Computer network security / Computing / Software testing / Metasploit Project / Penetration test / Exploit / Transaction authentication number / Cloud computing

POTASSIUM: Penetration Testing as a Service Richard Li, Dallin Abendroth, Xing Lin, Yuankai Guo, Hyun-wook Baek, Eric Eide, Robert Ricci, and Jacobus Van der Merwe Current Pentesting

Add to Reading List

Source URL: acmsocc.github.io

Language: English - Date: 2016-02-21 03:10:51
754Computing / Computer network security / Wireless networking / IEEE 802.11 / Wireless / Local area networks / Wi-Fi / Wi-Fi Protected Access / Protected Extensible Authentication Protocol / IEEE 802.1X / Windows XP / Wireless security

Connecting to the Rovernet WPA2 Secured Wireless Network with Windows XP Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements in order to con

Add to Reading List

Source URL: www.it.mtu.edu

Language: English - Date: 2015-09-21 08:47:24
755Computing / Internet / Network architecture / Domain name system / Internet Standards / Internet protocols / Computer networking / Computer network security / Root name server / Network address translation / Content delivery network / Name server

Communication Networks Spring 2016 Last week on Communication Networks Laurent Vanbever

Add to Reading List

Source URL: comm-net.ethz.ch

Language: English - Date: 2016-05-08 12:55:33
756Computer network security / Computer security / E-commerce / Cybercrime / National security / Forcepoint / Threat / Supply chain attack / Information security awareness

CP005_DATAISM_CS3_S-18_Green_DotsOnly

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2016-04-05 18:15:36
757Security / Prevention / Economy / Cybercrime / Computer security / Data security / Computer network security / Corporate finance / Threat / Due diligence / Phishing / Mergers and acquisitions

Cyber Threats Targeting Mergers and Acquisitions 1 Table of Contents

Add to Reading List

Source URL: info.digitalshadows.com

Language: English
758Malware / Computer network security / Antivirus software / Computer virus / Intrusion detection system / Avira / Malware analysis / Malware research

SyScan’14, April 2–4, 2014, Singapore, Singapore Embracing the new threat: towards automatically, self-diversifying malware Mathias Payer

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
759Computing / Business / Economy / Computer network security / Cloud computing / Software as a service / Software distribution / Software industry / Virtual private network

Different  Options  for  Delivering  the  eQuip!  Solutions  –  October,  2015   www.e-­‐isg.com  1-­‐866-­‐845-­‐2416      

Add to Reading List

Source URL: ondemand.e-isg.com

Language: English - Date: 2015-10-20 13:29:02
760Cyberwarfare / Denial-of-service attacks / Computing / Internet Relay Chat / Cyberspace / Computer network security / Cybercrime / Denial-of-service attack / DDoS mitigation / Computer security / Neustar / Prolexic Technologies

APRIL 2016 NEUSTAR DDOS ATTACKS & PROTECTION REPORT THE THREATSCAPE WIDENS: DDOS AGGRESSION AND THE EVOLUTION OF IOT RISKS INTRODUCTION

Add to Reading List

Source URL: ns-cdn.neustar.biz

Language: English - Date: 2016-04-25 09:51:01
UPDATE