Computer network

Results: 31604



#Item
751Network architecture / Network address translation / Computing / Network protocols / Computer network security / Internet protocols / Traversal Using Relays around NAT / STUN / NAT traversal / Session Initiation Protocol

Introduction to the IETF ICE/TURN/STUN set of RFCs Emil Ivov, Pal Martinsen, Justin Uberti & Brandon Williams IETF 92 Copyright (cIETF Trust and the persons identified as the document authors

Add to Reading List

Source URL: ietf.org

Language: English - Date: 2015-07-07 02:17:33
752Data security / Computing / Computer security / Prevention / Computer network security / OWASP / Information security / Information Systems Security Association / Issa

Capitol of Texas ISSA Chapter - Meeting Minutes September 17, :30 AM – 1:00 PM

Add to Reading List

Source URL: www.austinissa.org

Language: English - Date: 2014-11-17 14:28:20
753Computing / Network architecture / Computer network security / IP addresses / Routing / Internet Standards / Network address translation / Port forwarding / Dynamic Host Configuration Protocol / Firewall / Private network / Iptables

1:1 NAT in ZeroShell Requirements The version of ZeroShell used for writing this document is Release 1.0.beta11. This document does not describe installing ZeroShell, it is assumed that the user already has a configured,

Add to Reading List

Source URL: www.zeroshell.net

Language: English - Date: 2011-12-28 16:43:31
754Wireless networking / Computing / Wireless / Wi-Fi / Computer network security / Technology / IEEE 802.11 / Local area networks / Wardriving / Wireless network / Wireless security / Wi-Fi Direct

PDF Document

Add to Reading List

Source URL: securingthehuman.sans.org

Language: English - Date: 2015-02-10 11:18:33
755Computing / Internet / Network architecture / Internet Standards / Internet protocols / Computer networking / Domain name system / IPv6 / Router / Linux Professional Institute Certification / Cisco Systems / Name server

Alejandro Acosta Cell# (+OBJECTIVE Seeking a challenging position with an esteemed organization, involving technology, IP infrastructure ,

Add to Reading List

Source URL: www.ayitic.net

Language: English - Date: 2016-07-25 15:03:16
756Computer security / Computer network security / Security / Data security / Salvatore J. Stolfo / Defense in depth

ALDR: A New Metric for Measuring Effective Layering of Defenses Nathaniel Boggs, Salvatore J. Stolfo Columbia University

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
757Software / System software / Computer security / Antivirus software / Avast Software / Intel Security / Computer virus / Avira / Clam AntiVirus / F-Secure

- CloudAV N-Version Antivirus in the Network Cloud Jon Oberheide, Evan Cooke, Farnam Jahanian

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-11 18:23:52
758Cryptography / Computing / Transport Layer Security / Key management / Public-key cryptography / Hypertext Transfer Protocol / Computer network security / HTTPS / Man-in-the-middle attack / Browser security / Public key certificate / Public key infrastructure

Improving the Usability of Web Browser Security Haidong Xia and Jose´ Carlos Brustoloni Department of Computer Science, University of Pittsburgh {hdxia,jcb}@cs.pitt.edu ABSTRACT

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-06-21 09:58:18
759Computer data storage / Computer hardware / Computing / DataDirect Networks / Non-volatile memory / Solid-state drive / Write amplification / Network file systems / Cloud storage

Protecting Your Data, Protecting Your Hardware Jean-Thomas Acquaviva, DDN March, 2016

Add to Reading List

Source URL: www.hpcadvisorycouncil.com

Language: English - Date: 2016-04-06 01:18:19
760Cryptographic protocols / Computing / Computer network security / Local area networks / IEEE 802.11 / Wi-Fi Protected Access / 11i / Orthogonal frequency-division multiplexing / Wireless / Technology / Broadband

I N T U I C O M BroadBand Solutions 5GHzGHz BROADBAND SPECIFICATIONS K E Y F E AT U R E S

Add to Reading List

Source URL: www.econolite.com

Language: English - Date: 2016-02-19 05:24:29
UPDATE