Computer network

Results: 31604



#Item
841Computing / Software / Backup software / System software / Business continuity and disaster recovery / Backup / Cloud storage / Remote backup service / Computer data storage / Continuous data protection / Storage area network / SOS Online Backup

Coughlin Associates Data Protection for Small Businesses and Homes Thomas M. Coughlin Coughlin Associates, Inc.

Add to Reading List

Source URL: tomcoughlin.com

Language: English - Date: 2007-08-09 00:48:54
842Computing / Computer architecture / Inter-process communication / Cross-platform software / Clientserver model / Network architecture / Session / Client / XMPP / Server / Application server

Thialfi: A Client Notification Service for Internet-Scale Applications Atul Adya Gregory Cooper

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 2011-09-20 03:36:52
843Computing / Computer security / Payment systems / Economy / Computer law / Information privacy / Payment Card Industry Data Security Standard / Penetration test / Software testing / CDE / Network segmentation / Credit card

PCI DSS Penetration Testing Standard for University of Tennessee Merchants Revision: August 25, 2015 Purpose To outline the key roles and responsibilities, requirements, and notification methods

Add to Reading List

Source URL: 3fup3p2pb35f2iroyz2x2mre.wpengine.netdna-cdn.com

Language: English - Date: 2016-03-28 09:34:18
844Computing / Network architecture / Computer architecture / Network protocols / Ethernet / Emerging technologies / Fault-tolerant computer systems / OpenFlow / Software-defined networking / Fault tolerance / Path protection / MPLS local protection

FatTire: Declarative Fault Tolerance for Software-Defined Networks Mark Reitblatt Marco Canini

Add to Reading List

Source URL: perso.uclouvain.be

Language: English - Date: 2013-11-29 09:03:54
845Software engineering / Computer programming / Computing / Object-oriented programming / Network socket / Cross-platform software / Method / Berkeley sockets / Inheritance / Virtual function / Winsock / Go

Easy Event Notification Using Multiple Inheritance: An Example Using WinSock By Chris Sells, 6/95 C++ is a much-maligned language. It continues to take potshots from all sides. Although I can’t help agreeing with some

Add to Reading List

Source URL: sellsbrothers.com

Language: English - Date: 2015-08-22 14:30:08
846Software / Computing / System software / Web scraping / Wireshark / Computer networking / Cyberwarfare / Network forensics / Wireless networking / Internet protocol suite / Port scanner / Transmission Control Protocol

COURSE COST ESTIMATOR and QUOTE REQUEST PDF VersionWelcome to the Course Estimator and Quote Request Form Ready to train your team on Wireshark, TCP/IP analysis, troubleshooting and network forensics? Determi

Add to Reading List

Source URL: www.chappellu.com

Language: English - Date: 2012-07-03 17:20:13
847Transport / Land transport / Road traffic management / Road transport / Wireless networking / Emerging technologies / Vehicle telematics / Vehicular communication systems / Traffic congestion / Vehicular ad hoc network / Botnet / Vehicle-to-vehicle

Congestion Attacks to Autonomous Cars Using Vehicular Botnets Mevlut Turker Garip, Mehmet Emre Gursoy, Peter Reiher, Mario Gerla Department of Computer Science, University of California Los Angeles {mtgarip, memregursoy,

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2015-06-09 13:27:55
848Computer security / Cyberwarfare / Security / Computer network security / Hacking / Software testing / Vulnerability / Application security / Web application firewall

Microsoft PowerPoint - VulnerabilityManagementInAnApplicationSecurityWorld_OWASPDC_20090805.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:23
849Cyberwarfare / Computer security / Computing / Computer network security / Threat model / Hacking / Software testing / Threat / STRIDE / Vulnerability / SQL injection / Security

Microsoft PowerPoint - ISSA threat modeling.ppt [Read-Only]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:19
850Computing / Ethernet / Computer architecture / Flow control / Network performance / Parallel computing / RDMA over Converged Ethernet / Computer memory / IWARP / TCP offload engine / Internet protocol suite / Transmission Control Protocol

Microsoft Word - RoCE - The Grand Experiment.docx

Add to Reading List

Source URL: www.chelsio.com

Language: English - Date: 2012-10-22 10:55:53
UPDATE