Computer network security

Results: 18127



#Item
941Computing / Software / Web development / Computer network security / HTML / World Wide Web / JavaScript / Cross-site scripting / Cross-site request forgery / HTTP cookie / Browser security / OpenSocial

Talking to Strangers Without Taking Their Candy: Isolating Proxied Content Adrienne Felt, Pieter Hooimeijer, David Evans, Westley Weimer University of Virginia {felt, pieter, evans, weimer}@cs.virginia.edu

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2008-03-19 15:40:17
942IPsec / Cryptographic protocols / Virtual private networks / Computer network security / Cryptographic software / StrongSwan / Internet Key Exchange / FreeS/WAN / OpenWrt / Openswan / IPv6 / Raspberry Pi

Die strongSwan Open Source VPN Lösung Open Source Trend Days 2013 Steinfurt www.strongswan.org

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2013-09-25 06:25:19
943Computer network security / Computing / Virtual private networks / Crypto-anarchism / Internet privacy / Network architecture / Cyberwarfare / Computer security

Microsoft Word - UTSI VPN Connection.docx

Add to Reading List

Source URL: cs.utsi.edu

Language: English - Date: 2013-10-03 17:02:20
944Computing / Computer network security / Technology / Virtual private networks / Networking hardware / Computer networking / Tunneling protocols / OpenVPN / Router / Computer appliance / Wi-Fi / Internet

EINE Easy Internet vpN Extender Large-scale plug&play x86 network appliance deployment over Internet Olivier COCHARD-LABBÉ

Add to Reading List

Source URL: www.bsdcan.org

Language: English - Date: 2015-11-20 12:50:18
945Cybercrime / National security / E-commerce / Computer network security / Computer security / Cryptography / European Union Agency for Network and Information Security / Isse punctata / IASME

ISSE/2015/Press releases/Dr Emma Philpott FINAL: 10th August 2015 Dr Emma Philpott to Engage Small Companies in Cyber Security at Information Security Solutions Europe 2015 ISSE 2015 takes place 10th and 11th November 20

Add to Reading List

Source URL: www.isse.eu.com

Language: English - Date: 2015-08-14 05:29:14
946Security / Cyberwarfare / Computing / Computer network security / Computer security / Logistics / Supply chain management / E-commerce / EPCglobal Network / EPCIS / EPCglobal / Radio-frequency identification

Modeling in 12 Threat EPC-Based Information Sharing Networks Alexander Ilic, Trevor Burbridge, Andrea Soppera, Florian Michahelles, and Elgar Fleisch

Add to Reading List

Source URL: cocoa.ethz.ch

Language: English - Date: 2013-05-23 02:06:52
947Computing / Software / System software / Computer network security / Computer networking / Data security / Cyberwarfare / Wireless networking / Firewall / Transmission Control Protocol / Packet analyzer / Packet loss

Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention Jose M Gonzalez Vern Paxson

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:08
948Computing / Internet / Computer security / Internet privacy / Computer network security / Computer networking / Proxy servers / Internet protocols / Tor / Proxy list / Anonymizer / Open proxy

Design of a blocking-resistant anonymity system Roger Dingledine and Nick Mathewson , Tor Tech ReportNovember 2006

Add to Reading List

Source URL: research.torproject.org

Language: English - Date: 2012-08-31 06:11:24
949Computing / Cyberwarfare / Computer network security / Computer networking / OpenFlow / Network architecture / Software-defined networking / Nox / Firewall / Computer network / Computer security / Denial-of-service attack

A Security Enforcement Kernel for OpenFlow Networks Phillip Porras† Seungwon Shin‡ Vinod Yegneswaran† Martin Fong† Mabry Tyson† Guofei Gu‡ † SRI International

Add to Reading List

Source URL: www.openflowsec.org

Language: English - Date: 2013-10-15 15:03:15
950Computer security / Computing / Cryptography / Computer network security / Trusted computing / IPsec / Cryptographic software / Cryptographic protocols / StrongSwan / Trusted Network Connect / IF-MAP / Internet Key Exchange

The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment Andreas Steffen ITA Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil CH-8640 Rapper

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2012-08-29 15:32:53
UPDATE