Computer network

Results: 31604



#Item
521Security / Computer network security / Cyberwarfare / Crime prevention / Cryptography / Information governance / National security / Information technology controls / SarbanesOxley Act / Internal control / Computer security / Regulatory compliance

SECURITY COMPLIANCE MANAGEMENT COMPLY WITH SARBANES-OXLEY IT SECURITY CONTROLS The Challenge Section 404 of the Sarbanes-Oxley Act (SOX) requires that chief executives attest to the

Add to Reading List

Source URL: www.nsaservices.com

Language: English - Date: 2013-03-28 15:31:27
522Cryptography / Microsoft Windows / Computing / Computer network security / Authentication protocols / Kerberos / BitLocker / Password / Email

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
523Computing / Network architecture / Internet / Network performance / Internet Standards / Streaming / Computer networking / Internet protocols / Integrated services / Resource Reservation Protocol / Bandwidth Broker / Quality of service

A Scalable and Robust Solution for Bandwidth Allocation Sridhar Machiraju, Mukund Seshadri and Ion Stoica University of California at Berkeley Email: {machi, mukunds, istoica}@cs.berkeley.edu Abstract—We propose a nov

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2002-09-06 19:49:58
524Computing / Network architecture / Internet / Computer networking / Internet Standards / Routing / Internet protocols / Border Gateway Protocol / Forwarding plane / Software-defined networking / Router / Control plane

An Industrial-Scale Software Defined Internet Exchange Point Arpit Gupta and Robert MacDavid, Princeton University; Rüdiger Birkner, ETH Zürich; Marco Canini, Université catholique de Louvain; Nick Feamster and Jennif

Add to Reading List

Source URL: opensourcesdn.org

Language: English - Date: 2016-03-18 13:52:44
525Computing / Software / Computer security / Hacking / Computer network security / Software architecture / OWASP / ASP.NET / Application security / Cross-site scripting / Vulnerability / Web application

Microsoft PowerPoint - DenimGroup_IntroductionToApplicationSecurityInDotNETEnvironments.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:05
526Computer hardware / Computer data storage / Computer storage devices / Computing / Linux-based devices / Drobo / Server appliance / Computer storage media / Non-volatile memory

Drobo 5N The Faster, Easier Drobo for Your Network The Drobo 5N was designed with one purpose in mind: to deliver the best ever experience sharing storage and accessing data. From the moment

Add to Reading List

Source URL: drobo.wpengine.netdna-cdn.com

Language: English - Date: 2016-07-19 08:00:19
527Computing / Concurrent computing / Distributed computing / Computer networking / Internet broadcasting / Cloud storage / Digital television / Internet television / Content delivery network / Akamai Technologies / Dynamic site acceleration / Streaming media

WHITE PAPER What does AppEx do for Content Delivery Networks Maximizing Network Performance, Responsiveness and Availability

Add to Reading List

Source URL: appexnetworks.com

Language: English - Date: 2014-11-07 00:56:07
528Computing / Science and technology / Software engineering / Algorithm / Mathematical logic / Theoretical computer science / Object-relational database / Programming language / Computer science / Object-oriented programming / Artificial neural network / Database

COURSES IN ENGLISH AT THE FACULTY OF MATHEMATICS AND COMPUTER SCIENCE UNIVERSITY OF LODZ WINTER SEMESTER

Add to Reading List

Source URL: erasmus.math.uni.lodz.pl

Language: English - Date: 2015-10-13 07:15:16
529Malware / Cyberwarfare / Computer security / Trojan horses / Cybercrime / Computer network security / Social engineering / Zeus / Man-in-the-browser / International cybercrime / Identity theft / Transaction authentication number

RSA 2012 CYBERCRIME TRENDS REPORT The Current State of Cybercrime and What to Expect in 2012 Cybercrime continues to show no signs of slowing down. In fact, 2011 marked a year of new advanced threats and an increased lev

Add to Reading List

Source URL: www.cs.toronto.edu

Language: English - Date: 2012-05-28 11:33:54
530Software / Computing / System software / Proxy servers / Internet privacy / Reverse proxy / Computer networking / Network performance / Microsoft Forefront Threat Management Gateway / Squid / Internet Information Services / Windows NT 4.0

Technical Research Paper Performance tests with the Microsoft Internet Security and Acceleration (ISA) Server Author:

Add to Reading List

Source URL: www.webperformance.com

Language: English - Date: 2005-12-20 21:05:41
UPDATE