Computer network

Results: 31604



#Item
251Computing / Inter-process communication / Transmission Control Protocol / Remote procedure call / Ur / Network file systems / Computer network security

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYDistributed System Engineering: FallQuiz I

Add to Reading List

Source URL: nil.csail.mit.edu

Language: English - Date: 2015-01-05 06:37:34
252Computing / Computer networking / Named data networking / Content delivery network / Content centric networking / Web cache / Cache / Proxy server / Internet protocol suite / IP address / Hypertext Transfer Protocol / Peer-to-peer

Content Delivery with Content-Centric Networking

Add to Reading List

Source URL: www.cablelabs.com

Language: English - Date: 2016-04-25 12:06:02
253Computing / Hypertext Transfer Protocol / Session / World Wide Web / Invoice / Computer network security / Network architecture / Extensible Authentication Protocol

Frequently Asked Questions by Affiliates You will receive an authorization form for every client that has been approved to see you. As an affiliate, it is important that you not schedule any client without getting author

Add to Reading List

Source URL: secure.minesandassociates.com

Language: English - Date: 2013-08-06 16:42:27
254Computer network security / Computing / Security / Cyberwarfare / Bluetooth / Wireless / Medical device / Computer security / Man-in-the-middle attack / Bluesnarfing / Mobile security

Securing Legacy Mobile Medical Devices Vahab Pournaghshband, Majid Sarrafzadeh, and Peter Reiher Computer Science Department University of California, Los Angeles {vahab,majid,reiher}@cs.ucla.edu

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2012-09-17 16:56:34
255Network architecture / Computing / Computer architecture / Distributed computing architecture / Software architecture / Software engineering / Architectural pattern / Multitier architecture / World Wide Web / Clientserver model / Overlay network

Griffin: Towards an Agile, Predictive Infrastructure Anthony D. Joseph Sahara Retreat June 10, 2002

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2002-07-07 21:09:22
256Security / Computer security / Cyberwarfare / Computer network security / Web applications / Cryptography / Secure communication / Vulnerability / Web application firewall / Application security / Application firewall

The Increasing Risk to Enterprise Applications Sponsored by Prevoty Independently conducted by Ponemon Institute LLC Publication Date: November 2015

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2016-08-18 22:09:36
257Computing / Network architecture / Computer architecture / Internet protocol suite / Computer network / Information system / Network protocols / Systems engineering / Douglas Comer / IBM Systems Network Architecture

The University of North Carolina at Greensboro:17 PM Student Learning Outcomes

Add to Reading List

Source URL: assessment.uncg.edu

Language: English - Date: 2016-05-03 14:17:56
258Computer graphics / Computing / Graphics file formats / USGS DEM / United States Geological Survey / Portable Document Format / ArcMap / Software

Using the channel profile analysis tool, built by the University of Edinburgh Land Surface Dynamics group Part A: Extracting the channel network from a DEM Simon M. Mudd, Mikaël Attal, David T. Milodowski, Stuart W.D. G

Add to Reading List

Source URL: csdms.colorado.edu

Language: English - Date: 2013-09-12 07:38:07
259Academia / Computational science / Computer graphics / Infographics / Knowledge / Visualization / Self-organization / Social network analysis / Sensemaking / Visual analytics / Information visualization / Social network

SocialNetSense: Supporting Sensemaking of Social and Structural Features in Networks with Interactive Visualization Liang Gou*, Xiaolong (Luke) Zhang** Airong Luo†, Patricia F. Anderson‡

Add to Reading List

Source URL: zhang.ist.psu.edu

Language: English - Date: 2012-08-01 04:40:23
260Computing / Security / Marketing / Remote desktop / CompTIA / Technical support / System administrator / Computer security / Operating system / Help desk / Information technology specialist / Bomgar

Computer Network Technician MK Hay Ranch Ltd., Quesnel, $54,000 - $60,000 The main duties: • Maintain, troubleshoot and administer the use of local area networks (LANs), wide area networks (WANs), mainframe networks, co

Add to Reading List

Source URL: www.aviaemployment.ca

Language: English - Date: 2016-08-08 16:18:19
UPDATE