Computer network security

Results: 18127



#Item
971eGrants System Applicant User Guide  Nevada Traffic Safety eGrants System  Applicant User Guide

eGrants System Applicant User Guide Nevada Traffic Safety eGrants System Applicant User Guide

Add to Reading List

Source URL: egrants.nv.gov

Language: English - Date: 2015-01-31 09:12:09
972The Role of Web Hosting Providers in Detecting Compromised Websites Davide Canali Davide Balzarotti

The Role of Web Hosting Providers in Detecting Compromised Websites Davide Canali Davide Balzarotti

Add to Reading List

Source URL: www2013.wwwconference.org

Language: English - Date: 2014-07-21 08:47:06
973CyberCIEGE Can you keep the network alive? A Computer Network Security Video Game I want my Internet!

CyberCIEGE Can you keep the network alive? A Computer Network Security Video Game I want my Internet!

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2007-11-15 12:21:18
    974ENTERPRISE EDITION Datasheet ENTERPRISE EDITION AT A GLANCE An end-to-end system for

    ENTERPRISE EDITION Datasheet ENTERPRISE EDITION AT A GLANCE An end-to-end system for

    Add to Reading List

    Source URL: www.palamida.com

    Language: English - Date: 2015-06-17 16:42:29
    975A first look at real Multipath TCP traffic B. Hesmans, H. Tran-Viet, R. Sadre, O. Bonaventure ICTEAM, Universit´e catholique de Louvain, Louvain-la-Neuve, Belgium Abstract. Multipath TCP is a new TCP extension that attr

    A first look at real Multipath TCP traffic B. Hesmans, H. Tran-Viet, R. Sadre, O. Bonaventure ICTEAM, Universit´e catholique de Louvain, Louvain-la-Neuve, Belgium Abstract. Multipath TCP is a new TCP extension that attr

    Add to Reading List

    Source URL: inl.info.ucl.ac.be

    Language: English - Date: 2016-03-04 17:10:41
    976Towards Evidence-Based Security Adam Shostack ShmooCon ‘05 Slides at

    Towards Evidence-Based Security Adam Shostack ShmooCon ‘05 Slides at

    Add to Reading List

    Source URL: adam.shostack.org

    Language: English - Date: 2014-06-11 11:48:53
    977AbuseSA Frequently Asked Questions AbuseSA is the cornerstone to an intelligence-driven strategy strategy to help governments and CERTs to rapidly respond to abusive activity. The situational awareness solution provides

    AbuseSA Frequently Asked Questions AbuseSA is the cornerstone to an intelligence-driven strategy strategy to help governments and CERTs to rapidly respond to abusive activity. The situational awareness solution provides

    Add to Reading List

    Source URL: www.codenomicon.com

    Language: English - Date: 2016-03-02 04:58:14
    978Network Security of Internet Services: Eliminate DDoS Reflection Amplification Attacks Todd Booth1∗ and Karl Andersson2 Division of Computer Science, Lule˚a University of Technology, Sweden 1 Information Systems 2 Per

    Network Security of Internet Services: Eliminate DDoS Reflection Amplification Attacks Todd Booth1∗ and Karl Andersson2 Division of Computer Science, Lule˚a University of Technology, Sweden 1 Information Systems 2 Per

    Add to Reading List

    Source URL: isyou.info

    Language: English - Date: 2015-08-26 21:22:47
      979Codenomicon-AppCheck-Symbol-Lock

      Codenomicon-AppCheck-Symbol-Lock

      Add to Reading List

      Source URL: www.codenomicon.com

      Language: English - Date: 2016-03-02 04:58:12
      980HotSwap: Correct and Efficient Controller Upgrades for Software-Defined Networks Laurent Vanbever Joshua Reich

      HotSwap: Correct and Efficient Controller Upgrades for Software-Defined Networks Laurent Vanbever Joshua Reich

      Add to Reading List

      Source URL: vanbever.eu

      Language: English - Date: 2013-06-26 09:06:44