Computer network

Results: 31604



#Item
891Software / System software / Computing / USB / Special folder / File Explorer / Computer file / Trash / Live USB / Virtual folder

THE ICON-Newsletter of the Interactive Computer Owners Network July 2016 Andrew Cummins WHAT’S INSIDE Page President, ICON Computer Users Group

Add to Reading List

Source URL: www.iconusersgroup.org

Language: English - Date: 2016-07-08 13:33:42
892Software / Computing / Technology / Social networking services / Universal Windows Platform apps / Social networks / Applied statistics / Twitter / Twitter usage / Internet privacy / Geotagging / Social media

Identification of Key Locations based on Online Social Network Activity Hariton Efstathiades, Demetris Antoniades, George Pallis and Marios D. Dikaiakos Dept. of Computer Science, University of Cyprus Nicosia, Cyprus Ema

Add to Reading List

Source URL: www.cs.ucy.ac.cy

Language: English - Date: 2015-10-13 11:15:56
893Political philosophy / Irish Computer Society / International relations / Computing / Informatics / European Distance and E-learning Network / European Union / Information privacy / Draft:Council of European Professional Informatics Societies

56th CEPIS Council Meeting & Other News from CEPIS - May 2016 In this issue th We bring you news about the 56 CEPIS Council meeting, to take place on 7 May in Athens.

Add to Reading List

Source URL: www.drustvo-informatika.si

Language: English - Date: 2016-05-05 10:38:09
894Security / Prevention / Misconduct / Identity theft / Crime prevention / Cybercrime / Identity documents / Computer network security / Computer security / Password / Internet fraud / Internet privacy

11 Ways to Protect Yourself Online Thanks to the Internet, life is easier than it used to be. Recent headlines remind us, however, that technological progress has also created new opportunities for fraud (and much worse)

Add to Reading List

Source URL: www.cnb.com

Language: English - Date: 2014-08-06 17:57:41
895Computing / Network architecture / Computer networking / Routing / Internet Protocol / Routing bridge / Internet Standards / Link-state routing protocol / Internet protocol suite / IP forwarding / IPv4 / TRILL

Rbridges: Transparent Routing Radia Perlman Sun Microsystems Laboratories Abstract— This paper describes a method of interconnecting

Add to Reading List

Source URL: www.postel.org

Language: English - Date: 2004-08-30 19:33:05
896Security / Business / Economy / Cyberwarfare / Cybercrime / Computer network security / Computer security / Cryptography / National security / Certified Information Systems Security Professional / Arms industry / Cyber-security regulation

MarchJob Market Intelligence: Report on the Growth of Cybersecurity Jobs Matching People

Add to Reading List

Source URL: burning-glass.com

Language: English - Date: 2015-06-22 20:11:05
897Government / Security / Cyberwarfare / United States Department of Homeland Security / Computer security

Federal Network Security (FNS) Roadmap

Add to Reading List

Source URL: www.policefoundation.org

Language: English - Date: 2016-01-28 09:12:09
898Security / Computing / Prevention / Computer network security / Crime prevention / Cryptography / Information governance / National security / Capture the flag / Information security / Vulnerability / Computer security

Experiences In Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise ∗ Joseph Werther, Michael Zhivich, Tim Leek MIT Lincoln Laboratory POC:

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-07-08 13:42:25
899Software / Computing / Cyberwarfare / Computer network security / Internet Standards / Multi-agent systems / Spamming / Transmission Control Protocol / Skype / Botnet / Transport Layer Security / Network packet

Two Methods for Detecting Malware Maciej Korczyński, Gilles Berger-Sabbatel, and Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory UMR, rue de la Passerelle, BPSaint

Add to Reading List

Source URL: mkorczynski.com

Language: English - Date: 2015-02-15 17:10:50
900Computer security / Security / Prevention / Computer access control / Cryptography / Computer network security / Cybercrime / Identity management / Password / Authentication / One-time password / Salt

TwoKind Authentication: Usable Authenticators for Untrustworthy Environments Katelin Bailey Linden Vongsathorn

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-22 15:47:38
UPDATE