Computer network

Results: 31604



#Item
791Security / Computer network security / Prevention / Computing / Computer security / Network Access Control / Access control / Password / Network security / Information security / Home network / Firewall

PDF Document

Add to Reading List

Source URL: its.sjsu.edu

Language: English - Date: 2015-12-07 11:35:04
792Security / Prevention / Computer access control / Computer network security / Cryptography / Wireless networking / Password / Internet privacy / Biometrics / Wireless access point / Authentication / Email

Microsoft Word - master.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-07-13 14:07:08
793Computer architecture / Network architecture / Emerging technologies / Computing / Software / Open Platform for NFV / Network function virtualization / Linux Foundation / Software-defined networking / Linux / Open-source software

CASE STUDY Open Platform for Network Function Virtualization Project Case Study – A path to open source success with The Linux Foundation

Add to Reading List

Source URL: www.linuxfoundation.org

Language: English - Date: 2016-07-18 16:20:35
794Network architecture / Computing / Emerging technologies / Network function virtualization / Computer architecture / Wind River Systems / Orchestration / Open vSwitch / Cloud computing / 6WIND / Netcracker Technology

TITANIUM CLOUD OVERTURE AND WIND RIVER Carrier-Class Orchestration Enables Policy-Driven Automation

Add to Reading List

Source URL: www.wrs.com

Language: English - Date: 2016-08-16 03:59:49
795

Laptop/iPad Terms of Use Borrower’s Obligations  Students must follow all Kennesaw State University Information Technology Computer Usage Policies as well as Computer and Network Usage Policies (https://policy.kenne

Add to Reading List

Source URL: library.kennesaw.edu

- Date: 2016-02-19 10:58:26
    796Computing / Network file systems / Inter-process communication / Cloud storage / Cloud infrastructure / Cloudian / File system / Global Namespace / File server / Namespace / Server Message Block / Computer data storage

    Cloudian HyperStore Connect for Files ® Cloudian HyperStore® Connect for Files allows enterprises to offer scalable file services on top of Cloudian HyperStore object storage

    Add to Reading List

    Source URL: www.cloudian.com

    Language: English - Date: 2016-07-29 17:37:30
    797Computing / Multi-agent systems / Spamming / Computer network security / Concurrent computing / Botnets / Storm botnet / Educational technology

    Beyond Text Performances, Sounds, Images, Objects Beyond Text Before and After Professor Evelyn Welch

    Add to Reading List

    Source URL: www.beyondtext.ac.uk

    Language: English - Date: 2012-04-18 04:41:09
    798Computer security / Computer network security / Cyberwarfare / Software testing / Computing / OWASP / Application security / Penetration test / Vulnerability

    Microsoft PowerPoint - ApplicationAssessmentTechniques_OWASPNoVa_20090806.ppt [Compatibility Mode]

    Add to Reading List

    Source URL: denimgroup.com

    Language: English - Date: 2014-01-13 18:17:33
    799Artificial neural networks / Artificial intelligence / Machine learning / Computational neuroscience / Computational linguistics / Cybernetics / Artificial intelligence applications / Computer-assisted translation / Deep learning / Long short-term memory / Recurrent neural network / Speech recognition

    arXiv:1409.3215v3 [cs.CL] 14 Dec 2014

    Add to Reading List

    Source URL: arxiv.org

    Language: English - Date: 2014-12-15 20:32:58
    800Computing / Computer networking / Internet Standards / Computer network security / Datakit / Telnet / Internet protocol suite / Firewall / UUCP / Simple Mail Transfer Protocol / Transmission Control Protocol / ARPANET

    ches Fri Apr 20 07:46:11 EDT 1990 The Design of a Secure Internet Gateway Bill Cheswick AT&T Bell Laboratories

    Add to Reading List

    Source URL: www.avolio.com

    Language: English - Date: 2007-12-29 17:42:40
    UPDATE