Computer network security

Results: 18127



#Item
901Computing / Computer security / Software / Computer network security / Cyberwarfare / Data security / Port scanner / Transmission Control Protocol / Firewall / Antivirus software / Cache / Bloom filter

Very Fast Containment of Scanning Worms Nicholas Weaver ICSI Stuart Staniford Nevis Networks

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:10
902Computing / Cryptography / Computer network security / Network architecture / IPsec / Cryptographic protocols / Virtual private networks / Tunneling protocols / StrongSwan / Internet Key Exchange

VPN with Mobile Devices revisited 55. DFN Betriebstagung Oktober 2011 Berlin Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications HSR Hochschule für Technik Rapperswil

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2011-10-24 00:14:43
903Computer network security / IPsec / Virtual private networks / Cryptographic protocols / Cryptographic software / StrongSwan / Internet Key Exchange / RADIUS / Extensible Authentication Protocol / AuthIP

Microsoft PowerPoint - LinuxTag2009_Flyer_VPN_Solution.ppt [Compatibility Mode]

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2009-06-21 15:09:29
904Software development / Computer security / Cyberwarfare / Software testing / Computer network security / Software Bill of Materials / Software development process / Software project management / Supply chain management / Vulnerability / Codenomicon / Patch

AppCheck Build a More Resilient World KEY APPCHECK FEATURES: • Scan Anything in Minutes

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
905Software / Computer security / Computing / Software testing / Computer security software / Computer network security / Hacking / Nmap / Nessus / Port scanner / Metasploit Project / Penetration test

Penetration TestingPenetration Testing

Add to Reading List

Source URL: cs.brown.edu

Language: English - Date: 2010-12-07 19:50:06
906Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / National security / Cyber-attack / Cyber security standards

Roadmap to Secure Control Systems in the Water Sector

Add to Reading List

Source URL: www.awwa.org

Language: English - Date: 2013-03-29 15:26:12
907Cyberwarfare / Computer security / Security / Computer network security / Software testing / Software bugs / Hacking / Vulnerability / Buffer overflow protection / Exploit / Attack

Relative Vulnerability: An Empirical Assurance Metric Crispin Cowan, PhD CTO, Immunix

Add to Reading List

Source URL: adam.shostack.org

Language: English - Date: 2014-06-11 11:49:30
908Software / Computing / Computer networking / Named data networking / Computer network security / Cyberwarfare / Network architecture / Synchronization / DOS Navigator / Internet protocol suite / Google Chrome / Computer security

Microsoft Word - icnt44-ben-abraham

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:10:15
909Computing / Network architecture / Computer network security / Emerging technologies / Network protocols / OpenFlow / Middlebox / Software-defined networking / Engineering / Computer network / Provisioning / Technology

A Slick Control Plane for Network Middleboxes Bilal Anwer Theophilus Benson Georgia Tech

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2013-07-08 16:07:10
910Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Secure communication / Bachelor of Science in Information Technology / University of Limerick / Electrical engineering / Pulchok Campus / UP Diliman Electrical and Electronics Engineering Institute

Technical image with pc board connected to testing wires. laptop, drawings and multimeter in scene.

Add to Reading List

Source URL: www.ece.ul.ie

Language: English - Date: 2015-04-20 11:48:45
UPDATE