Computer network security

Results: 18127



#Item
761Computing / Cyberwarfare / Computer security / E-commerce / Deception / Computer network security / Secure communication / Internet security / Malvertising / Malware / Ransomware / SonicWall

Microsoft Word - Dell_Security Threat Report_Exec Summary_021816_4pm PT

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2016-04-25 15:10:36
762Cryptography / Security / Computer security / Computer access control / Computer network security / Barcodes / Cybercrime / Hypermedia / QR code / Authentication / Password / SQRL

SAVVIcode: Preventing Mafia Attacks on Visual Code Authentication Schemes (Short Paper) Jonathan Millican and Frank Stajano , University of Cambridge Computer Laboratory, Cambr

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-07-13 10:08:14
763Security / Prevention / Safety / Vulnerability / Computer network security / Hacking / Software testing / Computer security / Patch / Social vulnerability

Leoni Veranstaltung

Add to Reading List

Source URL: www.greenbone.net

Language: English - Date: 2016-06-16 08:24:26
764Computing / Computer hardware / Computer data storage / Computer storage devices / Backup / Data security / File server / Network-attached storage / Drive / Solid-state drive / Google Drive

Share Data Storage Agreement – S Drive 1.0 Overview This S Drive Storage Service Level Agreement (SLA) is between the University of Arkansas - Division of Agriculture and the faculty and staff using the S Drive storage

Add to Reading List

Source URL: agritech.uark.edu

Language: English - Date: 2015-10-27 11:40:24
765Computing / Software / System software / Computer network security / Computer networking / Network management / Network performance / NetFlow / Deep packet inspection / Traffic flow / Berkeley Packet Filter / Firewall

goProbe: A Scalable Distributed Network Monitoring Solution Lennart Elsen, Fabian Kohn Open Systems AG {lel,fko}@open.ch Abstract—The Internet has developed into the primary

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2015-12-18 04:40:36
766Data security / Computer security / Security / Computer network security / Cryptography / Information security management system / IT risk management / Information security / ISO/IEC 27001:2013 / Vulnerability / Security controls / Risk management

POLICY think project! INFORMATION SECURITY MANAGEMENT SYSTEM INFORMATION SECURITY POLICY

Add to Reading List

Source URL: www.thinkproject.com

Language: English - Date: 2015-03-17 10:50:21
767Computing / Domain name system / Internet / Network architecture / Internet privacy / Computer network security / DNS hijacking / Hacking / Transmission Control Protocol / Proxy server / CNAME record / Captive portal

On Robust Covert Channels Inside DNS Lucas Nussbaum, Pierre Neyron and Olivier Richard Abstract Covert channels inside DNS allow evasion of networks which only provide a restricted access to the Internet. By encapsulatin

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2011-10-12 09:35:39
768Computer network security / Computing / Computer security / Network management / Information technology management / Routing / Middlebox / Proxy server / Firewall / Network address translation / Load balancing

On the Complexity of Verifying Stateful Networks A. Panda S. Shenker

Add to Reading List

Source URL: tce.technion.ac.il

Language: English - Date: 2015-06-21 01:59:23
769Computer network security / Wi-Fi / Wireless networking / IEEE 802.11 / Wi-Fi Protected Access / IEEE 802.1X / AirPort / Wireless security / Extensible Authentication Protocol

Connecting to the Rovernet WPA2 Secured Wireless Network with the Mac OS XPanther) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirement

Add to Reading List

Source URL: www.it.mtu.edu

Language: English
770Software / System software / Computing / MacOS / Computer access control / Windows / Directory services / Computer network security / Keychain / Kerberos / Active Directory / Single sign-on

Apple Technical White Paper Best Practices for Integrating OS X with Active Directory OS X Yosemite v10.10

Add to Reading List

Source URL: training.apple.com

Language: English - Date: 2016-05-25 18:19:43
UPDATE