Computer network security

Results: 18127



#Item
821Computing / Internet privacy / Computer security / Computer networking / Sqrrl / Computer network security / Proxy server / Threat / Big data

DATASHEET SQRRL ENTERPRISE TEST DRIVE VM Featuring Web Proxy Data and Threat Intelligence

Add to Reading List

Source URL: sqrrl.com

Language: English - Date: 2015-09-09 22:01:18
822Computing / Software / Computer security / Internet security / Computer network security / Internet privacy / Domain name system / DNS rebinding / Cyberwarfare / NoScript / Proxy server / Cross-site scripting

Protecting Browsers from DNS Rebinding Attacks Collin Jackson Adam Barth Andrew Bortz

Add to Reading List

Source URL: www.abortz.net

Language: English - Date: 2016-01-16 18:17:58
823Network management / Computer security / Data security / System administration / Computer systems / SolarWinds / Security information and event management / Log management / Information security operations center / User Activity Monitoring / TriGeo Network Security

CTA_Free_Trial_Button_Green

Add to Reading List

Source URL: cdn.swcdn.net

Language: English - Date: 2015-10-20 12:51:43
824Cyberwarfare / Computing / Computer security / Computer network security / Internet security / Cryptography / Cybercrime / Electronic voting / Malware / Denial-of-service attack / Computer virus / Computer worm

Security Considerations for Remote Electronic Voting over the Internet Avi Rubin AT&T Labs – Research Florham Park, NJ

Add to Reading List

Source URL: avirubin.com

Language: English - Date: 2012-11-01 14:51:07
825Computing / Security engineering / Computer security / Security / Computer network security / Sqrrl / Threat / Cyberwarfare / Cybercrime / E-commerce / Big data / Information security operations center

DATASHEET SQRRL ENTERPRISE USE CASE: CYBER HUNTING Proactively uncover hidden threats through cyber hunting The days when Security Operations Center analysts could sit back and wait for alerts to come to them have long

Add to Reading List

Source URL: sqrrl.com

Language: English - Date: 2016-02-15 14:44:42
826Computing / Information technology management / Version control systems / Configuration management / Information technology / Technical communication / Computer network security / Method engineering / Baseline / Business process management / Software configuration management / Computer security

T H R E AT STA C K OV ER SIGHT SM

Add to Reading List

Source URL: www.threatstack.com

Language: English - Date: 2016-02-16 12:27:49
827Internet privacy / Web browsers / Computer network security / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Browser sniffing / Cross-site scripting / World Wide Web / P3P / Same-origin policy / Internet Explorer

Protecting Browser State from Web Privacy Attacks Collin Jackson Andrew Bortz Stanford University

Add to Reading List

Source URL: www.abortz.net

Language: English - Date: 2016-01-16 18:17:58
828Computer security / Computing / Security / Computer network security / Data security / Cryptography / National security / Cloud computing security / Vulnerability / Threat / Security controls / Service Organization Controls

SO C 2 CO MP LIA N CE ACHIEVING SOC 2 COMPLIANCE WITH THREAT STACK As a service provider storing and handling large amounts of customer data, you’re tasked with minimizing risk and exposure to this data. Inadequate se

Add to Reading List

Source URL: www.threatstack.com

Language: English - Date: 2016-03-16 05:56:01
829Security / Cyberwarfare / Cryptography / Computer network security / Computer security / Crime prevention / National security / Token / Ghana / Security token

Bitland Global White Paper Authored by: L. Chris Bates - C.S.O. Bitland Global

Add to Reading List

Source URL: www.bitland.world

Language: English - Date: 2016-03-28 10:17:55
830Computer security / Security / Access control / Computer access control / Role-based access control / PERMIS / Mandatory access control / Social networking service / Interpersonal ties / Social network / NIST RBAC model

Tie-RBAC: An application of RBAC to Social Networks Antonio Tapiador, Diego Carrera, Joaquín Salvachúa Universidad Politécnica de Madrid Abstract This paper explores the application of role-based access control to soc

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:02
UPDATE