Computer network security

Results: 18127



#Item
891Hacking / Cloud standards / Computer access control / Computer network security / Web development / JavaScript / HTTP cookie / Password manager / Cross-site request forgery / Cross-site scripting / Browser security / OAuth

Language-based Defenses against Untrusted Browser Origins Karthikeyan Bhargavan and Antoine Delignat-Lavaud, INRIA Paris-Rocquencourt; Sergio Maffeis, Imperial College London This paper is included in the Proceedings of

Add to Reading List

Source URL: www.defensivejs.com

Language: English - Date: 2013-08-15 09:17:30
892Internet privacy / Content-control software / Internet security / Internet censorship / Computer network security / Telex / Censorship / Tor / Steganography / Roman censor / Deep packet inspection / Flash proxy

Censorship Arms Race: Research vs. Practice Sadia Afroz1 , David Fifield1 , Michael C. Tschantz2 , Vern Paxson1,2 , J. D. Tygar1 1 2

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2015-07-07 21:36:37
893Computing / Cryptography / Network architecture / IPsec / Cryptographic protocols / Computer network security / Virtual private networks / Cryptographic software / StrongSwan / Internet Key Exchange / Opportunistic encryption / NAT traversal

Advanced Features of Linux strongSwan the OpenSource VPN Solution Institute of Internet Technologies and Applications Hochschule für Technik Rapperswil, Schweiz The powerful advanced features of the Linux strongSwan VPN

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2006-04-27 10:23:08
894Technology / Computer network security / Computing / Digital media / Cultural globalization / Internet / New media / Telegraphy / Virtual reality / Firewall / Hotspot / Targeted advertising

RaGaPa Hotspot Monetization Datasheet The RaGaPa Monetization solution provides an income producing model for businesses offering internet access to their patrons.

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2014-09-10 13:35:25
895Computing / Computer network security / Cyberwarfare / Data security / Transmission Control Protocol / Packet injection / Sandvine / Firewall / Traffic flow / Internet protocol suite / Idle scan

Detecting Forged TCP Reset Packets Nicholas Weaver ICSI Robin Sommer

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:05
896Computing / Cryptography / Computer network security / Computer security / IPsec / Virtual private networks / Cryptographic protocols / Cryptographic software / StrongSwan / Internet Key Exchange / RADIUS / Extensible Authentication Protocol

The Open Source VPN Solution for Mixed Platforms  Secure password login using IKEv2 EAP methods.  User credentials on Active Directory or FreeRadius.  strongSwan VPN Gateway scales up to 10‘000 clients.

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2010-06-11 08:24:10
897Computer security / Computer network security / Cloud infrastructure / Cloud computing / Salvatore J. Stolfo / Intrusion detection system

The MEERKATS Cloud Security Architecture Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang Columbia University {angelos,roxana,simha,sal,junfeng}@cs.columbia.edu Azzedine Benam

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2012-03-22 16:55:00
898

Compromised System Procedure The IT Security Office will need to be notified if any sensitive* information is, or is suspected to be stored directly on the compromised computer(s), network drives, removable drives, etc.

Add to Reading List

Source URL: security.fiu.edu

Language: English - Date: 2012-05-29 16:21:22
    899Software / System software / Utility software / NuFW / Computer network security / Discontinued software / Virtual private networks / Netfilter / Intrusion detection systems / Layer 2 Tunneling Protocol / Ipchains / Firewall

    Éric Leblond 44 rue Bayen ParisFRANCE Email: URL: https://home.regit.org

    Add to Reading List

    Source URL: home.regit.org

    Language: English - Date: 2013-09-19 13:58:52
    900Wireless networking / Computer network security / Local area networks / IEEE 802.11 / Wireless access points / Evil twin / Wi-Fi / Hotspot / Computer security / Wireless network / Service set / Wireless security

    METDS - A Self-contained, Context-Based Detection System for Evil Twin Access Points Christian Szongott1 , Michael Brenner1 , and Matthew Smith2 1 Distributed Computing & Security Group, Leibniz Universit¨

    Add to Reading List

    Source URL: fc15.ifca.ai

    Language: English - Date: 2015-01-11 00:32:52
    UPDATE