Computer network security

Results: 18127



#Item
991Computer networking / Computer network security / Ethernet / Network performance / Network management / Ipfirewall / FreeBSD / Network scheduler / Firewall / Traffic flow / Packet processing / Data Plane Development Kit

Portable packet processing modules for OS kernels ∗ Luigi Rizzo Universita` di Pisa, Italy

Add to Reading List

Source URL: info.iet.unipi.it

Language: English - Date: 2015-09-29 12:10:00
992Computing / Network architecture / Computer network security / OpenFlow / Cyberwarfare / OSI protocols / Transmission Control Protocol / Software-defined networking / SYN cookies / Denial-of-service attack / Data link layer / Forwarding plane

AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks Seungwon Shin† † Vinod Yegneswaran‡

Add to Reading List

Source URL: faculty.cse.tamu.edu

Language: English - Date: 2013-08-28 15:18:02
993Software / Computing / Computer security / Computer network security / Software testing / Penetration test / Application security / Vulnerability assessment / W3af / Security testing / Metasploit Project / Vulnerability

International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, NovemberAN OVERVIEW OF PENETRATION TESTING 1 Aileen G. Bacudio, 1Xiaohong Yuan, 2Bei-Tseng Bill Chu, 1Monique Jones

Add to Reading List

Source URL: airccse.org

Language: English - Date: 2011-11-30 01:55:07
994Cyberwarfare / Security / Computer security / Identity theft / Cybercrime / Cryptography / Computer network security / E-commerce / Password / Computer virus / Malware / Email

ONLINE SAFETY GUIDE Prepare • Progress • Achieve® www.ucu.maine.edu • University Credit Union is committed to the security and confidentiality of your personal and financial information. With the

Add to Reading List

Source URL: webidiz.net

Language: English - Date: 2014-01-16 08:50:20
995Security / Prevention / Crime prevention / Cryptography / National security / Computer network security / Cyberwarfare / Computer security

Advisory Committee for Information Technology Meeting Notes MEETING DATE: ATTENDEES GUESTS

Add to Reading List

Source URL: its.ucsc.edu

Language: English - Date: 2014-08-31 10:38:01
996Security / Computing / MIT Media Lab / Massachusetts Institute of Technology / Data visualization / Computer security

Connection Science and Engineering: What problems does network research need to solve? Industry Panel at Workshop on Information and Decision Science The world is moving to distributed, network systems for health, financ

Add to Reading List

Source URL: wids.lids.mit.edu

Language: English - Date: 2012-11-21 08:33:49
997

Building a SOC “Let us find your vulnerabilities before anyone else does.” Computer Network Defence Ltd’s (CND) Security Operations Centre (SOC) Service is a framework which provides clients with the design, delive

Add to Reading List

Source URL: www.cndltd.com

Language: English - Date: 2014-08-15 16:51:06
    998Computer network security / Software testing / Computing / Computer security / Cyberwarfare / OWASP / Web application security / Application security / Black-box testing / Acceptance testing / Penetration test / Test automation

    1 Testing Guide 4.0 Project Leaders: Matteo Meucci and Andrew Muller Creative Commons (CC) Attribution Share-Alike

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2014-09-24 14:15:00
    999Computing / Network performance / Computer network security / Computer security / Internet privacy / Transmission Control Protocol / Packet loss / Proxy server / Deep packet inspection / Voice over IP / Traffic shaping / Firewall

    Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention John Geddes Max Schuchard

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2013-09-04 16:00:20
    1000Computing / Network architecture / Internet / Internet protocols / Computer network security / Internet Standards / Transmission Control Protocol / Tunneling protocols / Port knocking / SOCKS / Internet protocol suite / Port scanner

    S ILENT K NOCK: Practical, Provably Undetectable Authentication Eugene Y. Vasserman1 , Nicholas Hopper1, John Laxson2 , and James Tyra1 1 Computer Science and Engineering, University of Minnesota, Minneapolis, MN 55455

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2007-07-26 16:56:51
    UPDATE