Computer network

Results: 31604



#Item
391Security / Computer security / Prevention / Crime prevention / Cryptography / Information governance / National security / CompTIA / Information technology specialist / Information security / EMASS / Information assurance

IT Linux Network Security Specialist - DL1203 Technology Service Corporation (TSC), an Engineering Services Provider with concentration providing Radar & Sensor technology, Algorithm & Software development, Modeling & Si

Add to Reading List

Source URL: www.tsc.com

Language: English - Date: 2015-10-14 13:33:57
392Computer security / Antivirus software / Software / Computer network security / Computing / Intel Security / Firewall / McAfee VirusScan

McAfee UTM Firewall Control Center versionRelease Notes This document provides information about McAfee UTM Firewall Control Center versionIt includes download and installation instructions for this releas

Add to Reading List

Source URL: go.mcafee.com

Language: English - Date: 2010-01-12 14:21:47
393Videotelephony / Session Initiation Protocol / Computing / Computer-mediated communication / Network architecture / SIP trunking / SSCA / Ingate Systems / Comparison of VoIP software

The SIP School™ Puts Hands-On Training onTAP™ with tekVizion Virtual Lab Virtual onTAP lab gives students real-world experience to learn SIP Trunking PLANO, Texas, U.S.A. — June 7, 2016 — The SIP School has part

Add to Reading List

Source URL: www.thesipschool.com

Language: English - Date: 2016-06-04 03:07:12
394Security / Computer security / Cyberwarfare / Computer network security / Crime prevention / Cryptography / National security / Government procurement in the United States / Critical infrastructure protection / NIST Cybersecurity Framework

DEFENSE CYBERSECURITY REQUIREMENTS: WHAT SMALL BUSINESSES NEED TO KNOW Office of Small Business Programs, U.S. Department of Defense 3600 Defense Pentagon, Room 3E185, Washington, DCWhy is cybersecurity impor

Add to Reading List

Source URL: www.acq.osd.mil

Language: English
395File sharing networks / Computing / Intellectual property law / Network performance / File sharing / Software / Peer-to-peer file sharing / Throughput / Gnutella / Peer-to-peer / Computer performance / GiFT

Quantifying Disincentives in Peer-to-Peer Networks Michal FeldmanÝ Kevin LaiÞ John ChuangÝ

Add to Reading List

Source URL: netecon.seas.harvard.edu

Language: English - Date: 2009-11-30 14:32:01
396Computer security / Cyberwarfare / Security / Cybercrime / Antivirus software / Computer network security / E-commerce / Secure communication / Phishing / Malware / Computer worm / Trusteer

the importance of layered security_fin-01

Add to Reading List

Source URL: www.malwarebytes.com

Language: English - Date: 2016-08-19 18:33:37
397Security / Computer security / Computing / Software testing / Computer network security / Cryptography / National security / Information security / Penetration test / Professional certification / Vulnerability / Security testing

Microsoft Word - choose_the_right_pentesting_company.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:21:33
398Technology / Wireless / Computing / Ubiquitous computing / Wireless networking / User interface techniques / Sensor node / Wireless sensor network / Internet privacy / Privacy / Location awareness / Radio-frequency identification

Exploiting Context Data Fidelity for Enhanced Privacy and Energy Savings Angela B. Dalton, Carla S. Ellis, and Abhijit Vijay Duke University Department of Computer Science angela,carla,

Add to Reading List

Source URL: www.cs.duke.edu

Language: English - Date: 2004-05-27 14:48:14
399Security / Cyberwarfare / Computer network security / Computer security / Cryptography / National security / Secure communication / Skybox

Under embargo until release at 8am EST, Wednesday, February 3rd, 2016 Skybox Security Gets $96 Million Investment from Providence Equity to Fuel Growth The fast-growing security analytics company will use funds to furth

Add to Reading List

Source URL: rembrandtvc.com

Language: English - Date: 2016-02-03 14:13:55
400Economy / Business / Security / Cybercrime / Cyberwarfare / National security / Small business / Small Business Administration / Computer security / New York State Small Business Development Center / Florida Small Business Development Center Network

Improving Small Business Cyber Security Act of 2016 Rep. Richard Hanna () | Rep. Derek Kilmer ()  Small businesses face a greater number of more sophisticated cyb

Add to Reading List

Source URL: hannaforms.house.gov

Language: English - Date: 2016-06-08 08:58:42
UPDATE