Computer network

Results: 31604



#Item
261Computer security / Computing / Computer network security / Data security / Information Systems Security Association / OWASP / Minutes / Information

Capitol of Texas ISSA Chapter - Meeting Minutes December 17, :30 AM – 1:00 PM

Add to Reading List

Source URL: www.austinissa.org

Language: English - Date: 2015-01-05 12:38:38
262Computing / Computer data storage / Cloud storage / Data management / Telecommunications engineering / Computer storage devices / Software-defined storage / FalconStor Software / Solid-state drive / ISCSI / Storage area network / IOPS

Intelligent Abstraction – Intelligent Predictive Analytics – Intelligent Action Storage Challenges for next Generation Scale-Out Data Center (WHD) © 2016 FalconStor Software®. All Rights Reserved

Add to Reading List

Source URL: www.whd.global

Language: English - Date: 2016-03-30 08:16:14
263Cyberwarfare / Security / Computer security / Computer network security / Ambient intelligence / Internet of things / Intel Security / Malware / Wind River Systems / Eurotech

Press Release Embedded Software Security Solutions to Ride Rising Tide of Internet of Things, According to VDC Research Ubiquitous connectivity will drive 26% annual revenue growth for vendors to help thwart malware and

Add to Reading List

Source URL: www.vdcresearch.com

Language: English - Date: 2016-02-01 13:56:30
264Computing / Computer networking / Network architecture / Emerging technologies / Dell / Network function virtualization / Dell Networking / VNF / Force10 / Data Plane Development Kit / Traffic classification / Software-defined networking

Breaking the Terabit Barrier: A One Terabit per Second Policy Control Virtual Network Function A Sandvine Technology Showcase Contents Executive Summary ................................... 1

Add to Reading List

Source URL: www.sandvine.com

Language: English
265Computing / Computer access control / Computer security / Identity management systems / Identity management / Federated identity / ForgeRock / Cloud standards / Computer network security / User-Managed Access / Customer engagement / Provisioning

Why Financial Services Choose ForgeRock What We Do IMPROVE CUSTOMER EXPERIENCE

Add to Reading List

Source URL: www.forgerock.com

Language: English - Date: 2016-08-11 01:02:02
266Computing / Spamming / Cyberspace / Multi-agent systems / Computer network security / Botnets / Cybercrime / Email spam / Anti-spam techniques / Bagle / Email / Computer virus

DRSA MessageLabs Intelligence: March 2006 Introduction Welcome to the March edition of the MessageLabs Intelligence monthly report. This report provides the latest

Add to Reading List

Source URL: londonactionplan.org

Language: English - Date: 2016-04-26 15:59:10
267Information privacy / Economy / Payment cards / Computing / E-commerce / Information / Cryptography / Computer law / Payment Card Industry Data Security Standard / Information security / Data security / Network segmentation

Microsoft Word - PCI DSS Information Security Policy (v2016.1)

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:18:12
268Avaya / Computing / Network architecture / Computer architecture / Ethernet / Telecommunications equipment / Alcatel-Lucent / Videotelephony / Network switch / Avaya VSP 8000 Series / Virtual Enterprise Network Architecture

BCM Rls 6.0 BCM50 Hardware & Installation Task Based Guide BCM50 Hardware & Installation

Add to Reading List

Source URL: pbxbook.com

Language: English - Date: 2013-02-27 07:04:32
269Wireless sensor network / Computing / Wireless networking / Computer networking / Technology / Data transmission / Sensor node / ANT / Packet forwarding / Node

Comparative Performance Analysis of the PermaDozer Protocol in Diverse Deployments Matthias Keller, Matthias Woehrle‡ , Roman Lim, Jan Beutel, Lothar Thiele ETH Zurich, Computer Engineering and Networks Laboratory, 809

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2015-05-18 12:16:34
270Computing / Internet / Network architecture / Internet Standards / Internet protocols / Domain name system / Name server / Computer network / Recursive InterNetwork Architecture

Answers to Practice Questions for Exam 1 (Internet Basics) Answer 1-Internet: The ordered list of goals is 1. multiplexed utilization of existing networks 2. survivability in the face of failure

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2013-10-09 23:03:16
UPDATE