Computer network

Results: 31604



#Item
441Computing / Computer architecture / Software / Network file systems / Internet protocols / Network File System / File locking / Struct / Stat / Mkdir / Server / File system

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallMidterm Exam Answers

Add to Reading List

Source URL: nil.csail.mit.edu

Language: English - Date: 2015-01-05 06:37:34
442Cyberwarfare / Computing / Computer network security / Computer security / Multi-agent systems / Botnets / Spamming / Malware / Computer virus / Spyware / Command and control / Cybercrime

THE FACTS: MALWARE AND BOTNETS What are computer viruses? Viruses are harmful computer programs that can be transmitted in a number of ways and differ in many ways, but are all designed to spread themselves from one comp

Add to Reading List

Source URL: www.arcyber.army.mil

Language: English - Date: 2016-03-15 15:31:42
443Software / SCADA / Computing / Computer network security / Computer security / WinCC / Control engineering / CVSS / S7 / Countermeasure / Vulnerability

Siemens Security Advisory by Siemens ProductCERT SSA: Vulnerabilities in SIMATIC WinCC, PCS 7 and WinCC Runtime Professional Publication Date

Add to Reading List

Source URL: www.siemens.com

Language: English - Date: 2016-08-11 10:42:00
444Computing / Concurrent computing / Distributed computing / Data management / Cloud storage / Computer networking / Data center / Distributed data storage

Office of Technology Services Network Management Systems Section/Enterprise Network Branch Statewide Telecommunications and Network Division Data Processing Manager III / $7,442 - $8,872 Permanent/Fulltime Final File Dat

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2016-08-03 16:34:57
445Mathematics / Computational complexity theory / NP-complete problems / Algorithm / Mathematical logic / Theoretical computer science / Graph partition / Community structure / Connectivity

Scalable Flow-Based Community Detection for Large-Scale Network Analysis Seung-Hee Bae∗ , Daniel Halperin∗ , Jevin West† , Martin Rosvall‡ and Bill Howe∗ ∗ Department of Computer Science and Engineering, Uni

Add to Reading List

Source URL: www.jevinwest.org

Language: English - Date: 2015-11-11 00:05:03
446Software / Computing / Proprietary software / Economy / Business intelligence / Network management / Computer systems / VMware vSphere / VMware ESXi / VMware / Log management / Analytics

Log Insight Partner Program April 29, 2014 © 2014 VMware Inc. All rights reserved. Agenda

Add to Reading List

Source URL: vdc-download.vmware.com

Language: English - Date: 2014-05-12 14:07:14
447Security / Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / Information governance / National security / Computer virus / Intellectual property / Internet privacy / Website

TERMS The use of this website is subject to the following Terms, the Privacy Policy and any addi:onal terms and condi:ons and no:ces displayed by us on this website from :me to :me (together ‘Terms’). In the Terms, "

Add to Reading List

Source URL: yarrabend.com.au

Language: English - Date: 2016-06-17 02:00:37
448Engineering / Network theory / Computing / Electrical engineering / Network architecture / Computer architecture / Networks / Distributed computing architecture / Overlay network / Routing / Shortest path problem / Topology

Z:WNMMSpaper iguresarabasi20K_regression_line.eps

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-06-01 13:43:33
449Network architecture / Computing / Internet / Internet Standards / Cryptographic protocols / Computer network security / Internet Protocol / TACLANE / IPv6 / Multiprotocol Label Switching / High Assurance Internet Protocol Encryptor / Router

Experiment Proposal Template

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2011-05-13 21:34:51
450Computer network security / Computing / Computer security / Cyberwarfare / Data security / Firewall / Network management / Managed security service / F5 Networks / Virtual security appliance

Managed Security Service – Basic Packageto be completed by customer) Dear 1-Net Customer, Please complete the attached document in its entirety and return directly your 1-Net Account Manager. ALL sectio

Add to Reading List

Source URL: 1-net.com.sg

Language: English - Date: 2015-12-30 21:08:34
UPDATE