Cyberwarfare

Results: 11990



#Item
971Guarding Your Web Systems  CLOUD-DMZ ™ Web APPLICATION Security  A NEW, CLOUD-BASED ARCHITECTURE

Guarding Your Web Systems CLOUD-DMZ ™ Web APPLICATION Security A NEW, CLOUD-BASED ARCHITECTURE

Add to Reading List

Source URL: www.sentrix.com

Language: English - Date: 2015-05-19 11:36:28
972CHAPTER  19 Electronic and Information Warfare All warfare is based on deceptionhold out baits to entice the enemy. Feign

CHAPTER 19 Electronic and Information Warfare All warfare is based on deceptionhold out baits to entice the enemy. Feign

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:51:56
973National Cyber Security and Organisational Research at NATO CCD COE Kadri Kaska NATO CCD COE Law and Policy Branch 13 May 2015

National Cyber Security and Organisational Research at NATO CCD COE Kadri Kaska NATO CCD COE Law and Policy Branch 13 May 2015

Add to Reading List

Source URL: resilience.enisa.europa.eu

Language: English - Date: 2015-05-18 07:23:59
974Guidelines for renewal of VPN account  1. VPN team is mailing prefilled VPN application as per existing information available and sending the auto generated pdf to the user with copy to the respective NIC coordinator atl

Guidelines for renewal of VPN account 1. VPN team is mailing prefilled VPN application as per existing information available and sending the auto generated pdf to the user with copy to the respective NIC coordinator atl

Add to Reading List

Source URL: vpn.nic.in

Language: English - Date: 2015-02-06 04:34:51
975DATA SHEET  FortiGate® Rugged 60D Integrated Security for Industrial Control Systems

DATA SHEET FortiGate® Rugged 60D Integrated Security for Industrial Control Systems

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:15:13
976DATA SHEET  FortiGate® 80D High Performance UTM for Small Networks

DATA SHEET FortiGate® 80D High Performance UTM for Small Networks

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:15:12
977NDIA Delaware Valley Chapter  Newsletter Volume 13, Number 1	  December 2014

NDIA Delaware Valley Chapter Newsletter Volume 13, Number 1 December 2014

Add to Reading List

Source URL: www.ndia-dvc.org

Language: English - Date: 2014-12-24 12:31:28
978BridgeSPA: Improving Tor Bridges with Single Packet Authorization Rob Smits  Ian Goldberg

BridgeSPA: Improving Tor Bridges with Single Packet Authorization Rob Smits Ian Goldberg

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-08-21 13:43:29
979Name of the Document  Configuring VPN in Android based Hand-held Devices Classification

Name of the Document Configuring VPN in Android based Hand-held Devices Classification

Add to Reading List

Source URL: vpn.nic.in

Language: English - Date: 2013-10-28 09:07:52
980Verifiable Security of Boneh-Franklin Identity-Based Encryption Federico Olmedo Gilles Barthe Santiago Zanella Béguelin IMDEA Software Institute, Madrid, Spain

Verifiable Security of Boneh-Franklin Identity-Based Encryption Federico Olmedo Gilles Barthe Santiago Zanella Béguelin IMDEA Software Institute, Madrid, Spain

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36