Computer network security

Results: 18127



#Item
981Security / Computer security / Prevention / Computer network security / Crime prevention / Cryptography / National security / Vulnerability / Internet security / Application security / Cloud computing security / Wireless security

White Paper Automotive Security Best Practices Recommendations for security and privacy in the era of the next-generation car.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-09-13 23:40:35
982Cyberwarfare / Security / Education / Distance education / Computer network security / Computer security / Cryptography / National security / Educational technology

This toolkit will quickly point you to the resources you need to help you perform your role in Cybersecurity. Do you have a question about how to do something or need more information about a topic? Select a category bel

Add to Reading List

Source URL: www.delawareptac.org

Language: English - Date: 2015-10-09 08:58:30
983Computer networking / Computing / Routing / Data transmission / Ethernet / Named data networking / Computer network security / Forwarding plane / Forwarding information base / Packet forwarding / Router / Port forwarding

NDN, Technical Report NDN-0028, 2015. http://named-data.net/techreports.html Revision 1: January 27, ndnSIM 2.0: A new version of the NDN simulator

Add to Reading List

Source URL: named-data.net

Language: English - Date: 2015-02-03 17:01:51
984Security / Computing / Prevention / Computer security / Computer network security / Cryptography / E-commerce / Secure communication / Cross-site request forgery / SQL injection / Password / Salt

Application Security Checklist V1.0 Document Audience Application Developers

Add to Reading List

Source URL: www.security.uci.edu

Language: English - Date: 2016-02-23 10:01:01
985Remote desktop / Remote administration software / Computing / Software / Security / BIOS / Splashtop Remote / Splashtop / Remote desktop software / Computer network security / Secure communication / Health Insurance Portability and Accountability Act

How Splashtop Helps Support HIPAA Compliance March 2015 Splashtop Inc.

Add to Reading List

Source URL: d36wcsykcv5g5l.cloudfront.net

Language: English - Date: 2015-04-06 14:05:53
986Secure communication / Internet Standards / Internet protocols / Computer network security / Internet security / SoftEther VPN / Tor / Internet protocol suite / Transport Layer Security / Port scanner / HTTPS / File Transfer Protocol

Examining How the Great Firewall Discovers Hidden Circumvention Servers Roya Ensafi David Fifield

Add to Reading List

Source URL: nymity.ch

Language: English - Date: 2015-09-09 09:56:25
987Computer security / Identity management / Access control / Internet privacy / Privacy / Security / Authorization / Privilege / Acceptable use policy / Privacy concerns with social networking services

Foothill-De Anza Community College District Board of Trustees Board Policy Manual Computer and Network Use: Rights and Responsibilities

Add to Reading List

Source URL: ets.fhda.edu

Language: English - Date: 2015-03-12 18:57:54
988Espionage / Computer security / Cyberwarfare / Computer network security / Trojan horses / Identity theft / Rogue software / Spyware / Morgan Marquis-Boire / Hacking Team / Proxy server / Citizen Lab

Research Brief March 2014 The Citizen Lab Hacking Team’s US Nexus

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2015-03-18 14:57:24
989Computing / Software / System software / Computer network security / Parallel computing / Intrusion detection systems / Computer security / Deep packet inspection / Network processor / Internet protocol suite / Bro / Transmission Control Protocol

Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson,1 K. Asanovi´c,2 S. Dharmapurikar,3 J. Lockwood,4 R. Pang,5 R. Sommer,1 N. Weaver1 Abstract The performance pressures on implementing e

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:02
990Actuarial science / Computer security / Security / Software maintenance / Computer network security / Patch / Vulnerability / Risk / Computer worm / Attack / Patch Tuesday / SAINT

VOLUME THREE · ISSUE TWO Secure Business Quarterly: Defining the Value of Strategic Security ILLUSTRATION: JUD GUITTEAU

Add to Reading List

Source URL: adam.shostack.org

Language: English - Date: 2014-06-11 12:01:38
UPDATE