Computer network security

Results: 18127



#Item
31Security / Cyberwarfare / Crime prevention / Cryptography / Information governance / National security / Computer network security / Computer security

Lawson Security Gain Momentum with Lawson Foundation 9.0 (LSF9) Security System

Add to Reading List

Source URL: www.ksols.com

Language: English - Date: 2014-10-14 22:33:10
32Computer security / Security / Cyberwarfare / Software testing / Cybercrime / Computer network security / Hacking / Cryptography / Vulnerability / Responsible disclosure / Phishing / Security testing

RESPONSIBLE DISCLOSURE POLICY    1.  General  Information.  The  SiteLock,  LLC   (“SiteLock”)  Responsible  Disclosure  Policy  details  the  process  by  which  SiteLock  publicly  discloses 

Add to Reading List

Source URL: www.sitelock.com

Language: English - Date: 2016-07-05 10:59:14
33Security / Cyberwarfare / Computer network security / Computer security / National security / Cybercrime / Cryptography / University of California / Merced /  California / Threat

Wednesday,  October  2 8,  2 015  at  1 2:37:42  PM  Pacific  Daylight  Time Subject: Mandatory  Cyber  Security  Awareness  Training  by  Jan.  31,  2016 Date: Friday

Add to Reading List

Source URL: it.ucmerced.edu

Language: English - Date: 2015-12-01 12:48:01
34Software / Computing / Computer security / Web development software / Computer network security / Adobe software / Adobe ColdFusion / System administration / OWASP / SQL injection / Zap / Sudo

Hack & Fix 
 Hands on ColdFusion Security Training Pete Freitag, Foundeo Inc. David Epler, AboutWeb LLC

Add to Reading List

Source URL: www.petefreitag.com

Language: English - Date: 2015-11-12 15:17:53
35Wireless networking / Wi-Fi / Computing / Wireless network / Login / Technology / Computer security / Local area networks / Wireless@SG / Wireless Zero Configuration

Information Technology User Guide Accessing ConnSCU Guests Wireless from Windows 7 Scope: CSCU

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2014-09-08 12:06:50
36Security / Computer network security / Cyberwarfare / Computer security / Cybercrime / Cryptography / Threat

Experimental  Challenges  in  Cyber  Security:   A  Story  of  Provenance  and  Lineage  for  Malware   Tudor  Dumitraș                  

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-08-22 18:12:38
37Cyberwarfare / Security / Computer security / Cybercrime / National security / Computer network security / Cryptography / Cyber-security regulation / Cybersecurity CS5L CMM

Security  is  Not  a  Commodity:   The  Road  Forward  for  Cybersecurity  Research   Stefan  Savage   UC  San  Diego    

Add to Reading List

Source URL: cra.org

Language: English - Date: 2016-03-07 14:51:02
38Computing / Internet / Network architecture / Internet Standards / Internet protocols / Networking hardware / Computer network security / Telnet / Internet protocol suite / Firewall / File Transfer Protocol / Gateway

A Network Firewall Marcus J. Ranum Digital Equipment Corporation Washington Open Systems Resource Center, Greenbelt, MD June 12, 1992

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2007-12-29 18:01:38
39Computing / Cyberwarfare / Cybercrime / Spamming / Computer security / Computer network security / Identity theft / Phishing / Malware / Computer virus / Carbanak / Email spam

TABLE OF CONTENTS Introduction 2 Key findings

Add to Reading List

Source URL: www.group-ib.com

Language: English - Date: 2016-03-17 04:17:16
40Computing / Network architecture / Transmission Control Protocol / Server / Internet Relay Chat / Network protocols / Computer network security / Internet protocols

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYDistributed System Engineering: SpringQuiz I Solutions

Add to Reading List

Source URL: nil.csail.mit.edu

Language: English - Date: 2015-01-05 06:37:34
UPDATE