Computer network

Results: 31604



#Item
661Computing / Computer network security / Computer security / Cyberwarfare / Computer networking / Firewall / Router / Proxy server / Computer network / Denial-of-service attack / Network security / Networking hardware

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2016-03-03 02:57:15
662Visualization / Computing / Computational science / Computer graphics / Infographics / Software / Communication design / Data modeling / Data visualization / Panopticon Software / Social network analysis software

Developing an Interactive Visualization DashBoard Framework for Large-MultiDisplay Environments Alberto Gonzalez Martinez

Add to Reading List

Source URL: lava.manoa.hawaii.edu

Language: English - Date: 2015-05-27 22:56:24
663Security / Computer network security / Cyberwarfare / Computer security / Cybercrime / National security / Areva / EPR / Threat

Cyber Security Program Overview AREVA is committed to being a trusted cyber security team member, supporting your ability to achieve cost-effective threat protection and

Add to Reading List

Source URL: us.areva.com

Language: English - Date: 2015-06-29 11:31:13
664Computing / Software / Computer data storage / Network file systems / Software appliances / RAID / Volume manager / ZFS / Server Message Block / Network-attached storage / Network File System / ALTEN Calsoft Labs

Cloud Controller Development and Testing Overview Development and testing the storage product which delivers cloud-integrated local NAS (Network Attached Storage) capabilities to a globally-distributed enterprise, allow

Add to Reading List

Source URL: sdn.calsoftlabs.com

Language: English - Date: 2014-03-25 06:13:27
665Security / Norbert Pohlmann / Prevention / Computer network security / Crime prevention / Cryptography / Information governance / National security / Computer security / Internet security / Gelsenkirchen

The next step in IT security after Snowden Prof. Dr. (TU NN) Norbert Pohlmann Institute for Internet Security - if(is)

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-12-10 07:43:45
666Security / Computer security / Computer network security / Computer access control / Login

Microsoft Word - computer policy 2013

Add to Reading List

Source URL: engineering.buffalo.edu

Language: English - Date: 2016-08-03 12:29:41
667Technology / Wireless networking / Electronics / Electronic countermeasures / Telecommunications engineering / Denial-of-service attacks / Computer network security / IEEE 802.11 / Electronic counter-countermeasure / Radio jamming / Wireless security / Wireless ad hoc network

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-27 11:39:29
668Computational neuroscience / Computer architecture / Computing / Reconfigurable computing / Computer engineering / Artificial neural networks / Computer vision / Convolutional neural network / Xilinx / Virtex / Constituency Labour Party / Field-programmable gate array

Overcoming Resource Underutilization in Spatial CNN Accelerators Yongming Shen Michael Ferdman

Add to Reading List

Source URL: www.ece.stonybrook.edu

Language: English - Date: 2016-07-05 09:09:38
669Cyberwarfare / Computer network security / Security / Computing / Denial-of-service attacks / Internet Relay Chat / Denial-of-service attack / Security appliance / Computer security / Unified threat management / Draft:Corero Network Security

SmartWall® THREAT DEFENSE SYSTEM DATA SHEET

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2016-02-01 14:49:53
670Computing / Network architecture / Computer networking / Local area networks / Internet protocols / Transmission Control Protocol / Open vSwitch / Packet loss / Transport layer / Out-of-order delivery / Load balancing / Internet protocol suite

Presto: Edge-based Load Balancing for Fast Datacenter Networks Keqiang He† Eric Rozner∗ Wes Felter∗ John Carter∗ †

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2015-07-09 17:05:07
UPDATE