Computer network

Results: 31604



#Item
721Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Computer access control / Internet Standards / Internet protocols / Transport Layer Security / OpenSSL / Authentication / Password

eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirchen

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:18:07
722Computing / Computer security / Cyberwarfare / Computer network security / Hacking / Cross-site scripting / Vulnerability / OWASP / Software quality / Application security / Software / Security

Microsoft PowerPoint - DenimGroup_IntroductionToApplicationSecurity.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:17:57
723Computing / Computer data storage / Computer hardware / Data management / Storage Networking Industry Association / XAM / Storage area network / Cloud storage / Solid-state drive / SNIA / Direct-attached storage / Storage Networking Certification Program

Storage Networking Concepts -- Foundations - NEW 2016 Mastering Storage Networking for the Storage Professional Course materials in preparation for the new SNCF 110 SNIA

Add to Reading List

Source URL: angelbc.com

Language: English - Date: 2016-01-27 04:56:00
724Computing / Computer architecture / Software / Red Hat / Fault-tolerant computer systems / Fencing / Network block device / Cluster computing / GFS2 / Red Hat cluster suite / Device mapper / Computer cluster

Using GNBD with Global File System Configuration and Administration Using GNBD with Global File System: Configuration and Administration Copyright © 2007 Red Hat, Inc.

Add to Reading List

Source URL: centos.org

Language: English - Date: 2007-03-21 03:38:01
725Computing / Network architecture / Internet / Internet Standards / Internet protocols / Computer network security / TACACS / IP address / Transmission Control Protocol / Simple Network Management Protocol / RADIUS / File Transfer Protocol

LX-Series Configuration Guide Corporate Headquarters MRV Communications, Inc. Corporate CenterNordhoff Street

Add to Reading List

Source URL: pbxbook.com

Language: English - Date: 2015-09-02 09:36:53
726Technology / Computing / Security / Computer network security / Internet privacy / Cultural globalization / Internet / New media / Telegraphy / Content-control software / Educational technology / Computer security

INSTRUCTIONTechnology Usage Policy The Inter-Lakes School District (hereto referred as “District”) recognizes the value of computer and other

Add to Reading List

Source URL: www.inter-lakes.k12.nh.us

Language: English - Date: 2016-05-31 20:05:16
727

Mapping P: drive on Citrix After logging onto Citrix, click on “Start” and the click on “My Computer” Click on “Tools” and “Map Network Drive” Next to “Drive:”, select P: ; next to “Folder:”, t

Add to Reading List

Source URL: alliedhealth.lsuhsc.edu

- Date: 2013-05-24 10:15:34
    728Computing / Fiber-optic communications / Network protocols / Network architecture / Computer architecture / Optical burst switching / Computer networking / Router / Core router / Optical switch / OBS / Burst switching

    A Hybrid Optical Burst/Circuit Switched Ingress Edge Router for Grid-enabled Optical Networks Georgios Zervas, Reza Nejabati, Dimitra Simeonidou, Photonic Networks Laboratory ,Department of Electronic Systems Engineering

    Add to Reading List

    Source URL: gridnets.org

    Language: English - Date: 2010-08-10 03:54:15
    729System software / Software / Computer architecture / Windows / Control Panel / Shared resource / File shortcut / Double-click / Special folder / My Network Places / Server / Roaming user profile

    Networking Ezi Accounting

    Add to Reading List

    Source URL: www.ezisolution.co.uk

    Language: English - Date: 2013-10-21 19:30:31
    730Spamming / Computing / Computer network security / Multi-agent systems / Botnets / Concurrent computing / Command and control / Storm Worm / Email spam / Storm botnet / Kelihos botnet

    Challenges in Experimenting with Botnet Detection Systems Adam J. Aviv Andreas Haeberlen University of Pennsylvania Abstract

    Add to Reading List

    Source URL: static.usenix.org

    Language: English - Date: 2011-07-08 13:42:23
    UPDATE