Computer network security

Results: 18127



#Item
11

Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ron Rivest Handout 3 February 24, 2012

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English
    12

    (IJCNS) International Journal of Computer and Network Security, 1 Vol. 2, No. 9, September 2010 Shadow Honeypots Kostas G. Anagnostakis,1 Stelios Sidiroglou,2 Periklis Akritidis,1,3 Michalis Polychronakis,4 Angelos D. Ke

    Add to Reading List

    Source URL: www.ics.forth.gr

    - Date: 2012-03-22 09:28:00
      13

      Computer Science Specialisations: internet networks, systems and computer networks, network and information technology security Degree obtained: Bachelor, Duration: 7 semesters (3,5 years) Selected subjects for

      Add to Reading List

      Source URL: www.pwsz.nysa.pl

      - Date: 2012-10-25 03:13:09
        14

        Two Visual Computer Network Security Monitoring Tools Incorporating Operator Interface Requirements William Yurcik James Barlow* Kiran Lakkaraju Mike Haberman National Center for Supercomputing Applications (NCSA) Univer

        Add to Reading List

        Source URL: www.andrewpatrick.ca

        - Date: 2003-02-12 07:18:34
          15Computing / Computer data storage / Telecommunications engineering / Data management / Storage area network / Fibre Channel / XAM / Storage security / ISO/IEC 27040

          STORAGE NETWORKING STANDARDS Management and Administration Building a Working Knowledge of Storage Networking Operations through a clear understanding of Solutions & Technology For professionals who are implementing and

          Add to Reading List

          Source URL: www.snia-sa.org

          Language: English - Date: 2010-10-20 15:16:23
          16Ethernet / IEEE standards / Networking hardware / Computing / Network switch / Engineering / Computer hardware / Dell Networking / Fibre to the office

          REACH ANYWHERE WITHOUT THE EXCESS SIMPLIFY YOUR SECURITY NETWORK WITH OPTIGO NETWORKING SOLUTIONS FOR SECURITY

          Add to Reading List

          Source URL: www.optigo.net

          Language: English - Date: 2015-10-05 17:30:08
          17Computing / Prevention / Security / Crime prevention / Cryptography / Information governance / National security / Computer security / Information security / Security awareness / Data center / Internet

          Computer and Network Security Original Implementation: January 24, 1995 Last Revision: November 2, 2015 This policy establishes the conditions and security requirements for the use of computing equipment and networks at

          Add to Reading List

          Source URL: www.sfasu.edu

          Language: English - Date: 2016-07-26 16:47:37
          18Technology / Education / Security / New media / Distance education / Educational psychology / Educational technology / Information technology / Computer security / Internet

          Pathways AcademyTechnology Use Agreement Pathways Academy Charter School recognizes the evolving impact of technology on education supports the appropriate use of the Pathways Academy network and the Internet

          Add to Reading List

          Source URL: www.pathwaysacademy.org

          Language: English
          19Security / Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / National security / Badge / Pittsburgh International Airport

          Lost/ Stolen Badge and Hangtag Report Lost/Stolen Airport Restricted Access Media and Hangtags shall be promptly reported to the Department of Public Safety and Operations and will be replaced only after the person to wh

          Add to Reading List

          Source URL: www.jmaasecurity.com

          Language: English - Date: 2013-07-09 16:29:00
          20Computing / Cryptography / Computer security / Internet protocols / Computer access control / Internet Standards / Code division multiple access / Computer network security / Diameter protocol / Authentication protocol / RADIUS / OAuth

          Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

          Add to Reading List

          Source URL: ietf.org

          Language: English - Date: 2014-03-02 06:27:58
          UPDATE