Computer network

Results: 31604



#Item
821Cyberwarfare / Computer network security / Denial-of-service attacks / Computing / Computer security / Internet Relay Chat / Denial-of-service attack / DDoS mitigation / Managed security service / Botnet / BlockDos / Prolexic Technologies

Service Provider Playbook_FINAL

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2016-06-20 09:50:39
822Computing / Education / Information / Educational psychology / Gamification / Stack Exchange network / Stack Overflow / Educational technology / Data visualization / Database / Visualization / Freebase

TechLand: Assisting Technology Landscape Inquiries with Insights from Stack Overflow Chunyang Chen, Zhenchang Xing, Lei Han School of Computer Engineering, Nanyang Technological University, Singapore .s

Add to Reading List

Source URL: ccywch.github.io

Language: English - Date: 2016-08-07 09:43:02
823Security / Prevention / Cryptography / Crime prevention / Information governance / National security / Computer network security / Information flow / Database transaction / Computer security

Verifying information security of dynamic, decentralized systems Andrew Myers IC3 retreat, May 2016

Add to Reading List

Source URL: www.initc3.org

Language: English
824Computing / Internet / Network architecture / Net neutrality / Computer network security / Internet privacy / Cultural globalization / New media / Router / Peering / Virtual private network / Autonomous system

ATLAS Internet Observatory 2009 Annual Report C. Labovitz, S. Iekel-Johnson, D. McPherson Arbor Networks, Inc. J. Oberheide, F. Jahanian

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-11 18:23:19
825Security / Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / National security

TERMS OF WEBSITE USE This page (together with the documents referred to on it) tells you the terms of use on which you may make use of our website [www.hiesscheme.org.uk] (our site), whether as a guest or a registered us

Add to Reading List

Source URL: www.hiesscheme.org.uk

Language: English - Date: 2016-02-15 06:37:40
826Numerical analysis / Numerical linear algebra / Gradient descent / Mathematical optimization / Gradient method / Reinforcement learning / Artificial neural network / Subgradient method

Projected Natural Actor-Critic Philip S. Thomas, William Dabney, Sridhar Mahadevan, and Stephen Giguere School of Computer Science University of Massachusetts Amherst Amherst, MA 01003

Add to Reading List

Source URL: psthomas.com

Language: English - Date: 2013-11-10 12:06:12
827Computing / Business / Computer networking / Technology / OpenFlow / Network architecture / Emerging technologies / Ethernet / OpenDaylight Project / ONOS / Network function virtualization / Cisco Systems

Supercharging SDN Security Takayuki Sasaki (NEC) Topics ▌ Control-plane security l Isolation and recovery

Add to Reading List

Source URL: www.ch-open.ch

Language: English - Date: 2016-06-16 13:14:14
828Local area networks / Computing / Ethernet / Wireless networking / Virtual LAN / Network switch / Wireless LAN / Technology / Computer network

The Cable Test will run and the results will be displayed upon its completion. For cascade repeat the same procedure for the secondary switch. Should the test fail, replace the cable and run the test again for that port.

Add to Reading List

Source URL: www.wildix.com

Language: English - Date: 2014-06-11 09:34:52
829Security / Prevention / Cyberwarfare / Cybercrime / National security / Computer network security / Computer security / Cryptography / United States Army Cyber Command / Cyberspace / United States Cyber Command / Password

THE FACTS: CYBERSECURITY TIPS FOR INTERNATIONAL TRAVELERS Before You Go  Treat your information and communications and the devices that contain and transmit as valuables. The more you protect

Add to Reading List

Source URL: www.arcyber.army.mil

Language: English - Date: 2016-03-15 15:31:42
830Security / Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / National security

•  Pique your interest in topics at the intersection between public domain data and international security. •  Outline some of the technical, ethical and legal challenges in this arena. •  Pose some question

Add to Reading List

Source URL: mmds-data.org

Language: English - Date: 2014-06-24 17:33:53
UPDATE