Computer network

Results: 31604



#Item
601Computing / Computer network security / Cloud infrastructure / Cloud computing / Computer security / Computer networking / Serena Software / Software as a service / ITIL / Multitenancy / Application security / Security service

SERENA SOFTWARE Serena Service Manager Security in the Cloud Author: Amitav Chakravartty

Add to Reading List

Source URL: www.serena.com

Language: English - Date: 2013-01-10 16:22:05
602Computing / Network architecture / Internet / Internet Standards / Internet protocols / IPv6 / IEEE 802 / Computer networking / Router / 6LoWPAN / Mesh networking / IEEE 802.15.4

Thread Stack Fundamentals white paper

Add to Reading List

Source URL: www.threadgroup.org

Language: English - Date: 2015-07-14 03:33:46
603Software / Computing / World Wide Web / Social networking services / Social media / Twitter / Universal Windows Platform apps / Web 2.0 / Reblogging / Hashtag / Tay / Facebook

What is Twitter, a Social Network or a News Media? Haewoon Kwak, Changhyun Lee, Hosung Park, and Sue Moon Department of Computer Science, KAIST 335 Gwahangno, Yuseong-gu, Daejeon, Korea {haewoon, chlee, hosung}@an.kaist

Add to Reading List

Source URL: www.eecs.wsu.edu

Language: English - Date: 2015-01-11 18:41:13
604Quantum cryptography / Cryptography / Quantum information science / Theoretical computer science / Physics / Quantum key distribution / BB84 / Photon / Quantum network

Quantum  cryptography  with   pseudorandom  bases  and  the   problem  of  quantum  state   discrimina8on   P.A.  Tregubov  and  A.S.  Trushechkin    

Add to Reading List

Source URL: ctcrypt.ru

Language: English - Date: 2016-06-10 06:35:53
605Technology / Security / Computer network security / Computer security / Crime prevention / Cryptography / Cyberwarfare / National security / Joint Light Tactical Vehicle / FIPS 140-2 / Global Positioning System / Telematics

Microsoft Word - 4RidgeFinalSEPres_08092103_0920.docx

Add to Reading List

Source URL: www.ndia-mich.org

Language: English - Date: 2013-08-19 10:06:02
606Transport / Land transport / Road traffic management / Road transport / Wireless networking / Emerging technologies / Vehicle telematics / Vehicular communication systems / Traffic congestion / Vehicular ad hoc network / Botnet / Vehicle-to-vehicle

Congestion Attacks to Autonomous Cars Using Vehicular Botnets Mevlut Turker Garip, Mehmet Emre Gursoy, Peter Reiher, Mario Gerla Department of Computer Science, University of California Los Angeles {mtgarip, memregursoy,

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2015-06-09 13:27:55
607Computing / Data management / Communications protocol / Data transmission / Computer networking / Data / Computer security / Telecommunications engineering / Data center / Information security

University of New Mexico IT Network Design Recommendations Fall, 2012 Prepared by:

Add to Reading List

Source URL: cio.unm.edu

Language: English
608Computing / Computer network security / Cyberwarfare / Technology / Security / National research and education network / Internet2 / Firewall / Internet / Computer security

PO BoxLawrence, KS9800 www.kanren.net

Add to Reading List

Source URL: www.kanren.net

Language: English - Date: 2016-04-18 09:55:25
609Computer security / Computing / Computer network security / Cyberwarfare / Security / Videotelephony / Data security / Integrated Services Digital Network / Network access / Security Target / Firewall / Oids

gsmyndigheten for IT-sikkerhet Norwegian Certificattion Authority for IT Security Sertifisering SERTIT T-012 MR Main ntena

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-09-19 06:43:40
610Cyberwarfare / Cybercrime / Computer security / Security / Computer network security / Social engineering / Phishing / Spamming / .tk / Threat / Crimeware / Ransomware

THREAT REPORT FortiGuard Eye of the Storm THREAT REPORT: FORTIGUARD EYE OF THE STORM

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2016-08-02 16:40:40
UPDATE