Computer network security

Results: 18127



#Item
931Wireless networking / Wireless / Computing / Wi-Fi / Technology / IEEE 802.11 / Wireless access points / Wireless network / Password / Hotspot / Wireless@SG

Information Security n Email n NetID n Online Services n Wireless & Wired Networks n Classroom Technology n Computer Labs n Imaging & Video Production n Cable TV n Phones http://its.syr.edu n

Add to Reading List

Source URL: its.syr.edu

Language: English - Date: 2016-03-05 04:33:50
932Software / Humancomputer interaction / System software / Computer mice / Network video recorder / Video hardware / NVR / Computer mouse / Menu / Point and click / Widget / Mouse button

Network Video Recorder User manual Network Video Recorder Declaration

Add to Reading List

Source URL: www.lowcost-security.ch

Language: English - Date: 2014-12-15 09:28:12
933Security / Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / National security

WWW.SMARTSIMPLE.COMThe Marine Institute of Ireland About The Marine Institute of Ireland

Add to Reading List

Source URL: www.smartsimple.com

Language: English - Date: 2015-10-14 09:52:58
934Computing / Software / System software / Computer systems / Network management / Log analysis / Login / Windows Security Log / Logfile / Event Viewer / Password / Windows

Authored by Anton Chuvakin (chuvakin.org) and Lenny Zeltser (zeltser.com). Reviewed by Anand Sastry. Distributed according to the Creative Commons v3 “Attribution” License. Cheat sheet version 1.0. Critical Log Revie

Add to Reading List

Source URL: www.securitywarriorconsulting.com

Language: English - Date: 2010-03-23 02:06:50
935Prevention / Computing / Safety / Computer network security / Software quality / Safety engineering / Dependability / Quality / Computer security / Security / Threat / Reliability engineering

ASSURE 2015: The 3rd International Workshop on Assurance Cases for Software-Intensive Systems Workshop Programme September 22, 2015 Delft, The Netherlands Tuesday, 22nd September 2015

Add to Reading List

Source URL: safecomp2015.tudelft.nl

Language: English - Date: 2015-09-14 10:24:36
936Cryptography / Computer network security / Computer security / Cyberwarfare / Kerberos / Key distribution center / Authentication protocol / Authentication / Ticket

Stealing credentials for impersonation Emmanuel Bouillon October 29, 2010 Introduction

Add to Reading List

Source URL: archive.hack.lu

Language: English - Date: 2010-10-29 15:08:35
937Computing / Software testing / Security / Computer security / Codenomicon / Computer network security / Heartbleed

Codenomicon_Corporate Backgrounder_2OCT14.indd

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
938Computing / Internet protocols / Network architecture / Computer network security / Cyberwarfare / Transmission Control Protocol / HTTP cookie / Port / Network packet / Firewall / Network socket / Application layer

Protocol-Independent Adaptive Replay of Application Dialog Weidong Cui† , Vern Paxson‡ , Nicholas C. Weaver‡ , Randy H. Katz† † University of California, Berkeley, CA ‡ International Computer Science Institut

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:00
939Botnets / Computing / Computer network security / Multi-agent systems / Spamming / Malware / Cyberwarfare / Torpig / Srizbi botnet / Command and control / Festi / Fast flux

Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California

Add to Reading List

Source URL: seclab.cs.ucsb.edu

Language: English - Date: 2010-12-20 14:49:07
940Computer security / Cyberwarfare / Computing / Software bugs / Computer worms / Computer network security / Witty / Hacking / Software testing / Buffer overflow / Stack buffer overflow / SQL Slammer

reflections on witty by Nicholas Weaver Nicholas Weaver is a postdoctoral researcher at the

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:03
UPDATE