In-network management

Results: 4346



#Item
561Occupational safety and health / Akshara Network / Disaster preparedness / Emergency management / Humanitarian aid

CAPABILITY STATEMENT DEVELOPMENT SECTOR ABOUT INSITU DEVELOPMENT CONSULTING

Add to Reading List

Source URL: www.in-dev.org

Language: English - Date: 2014-06-02 03:27:41
562Computer security / Computer network security / Crime prevention / National security / Public-key cryptography / Key management / Group Policy / Access control / Security policy / Security / Cryptographic protocols / Cryptography

Principles of Policy in Secure Groups Hugh Harney Andrea Colgrove SPARTA, Inc.

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:21:03
563Cryptographic protocols / Electronic commerce / X.509 / Diffie–Hellman key exchange / Public key infrastructure / Man-in-the-middle attack / Key authentication / Public key certificate / Key / Cryptography / Key management / Public-key cryptography

Lecture 13: Certificates, Digital Signatures, and the Diffie-Hellman Key Exchange Algorithm Lecture Notes on “Computer and Network Security” by Avi Kak () February 26, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-02-26 14:50:25
564Actuarial science / Reliability engineering / Safety engineering / Risk assessment / Food safety risk analysis / Hazard analysis / IT risk management / Network Theory in Risk Assessment / Risk / Safety / Management

COUNCIL FOR AGRICULTURAL AGRICULTURALSCIENCE SCIENCEAND AND TECHNOLOGY

Add to Reading List

Source URL: foodsci.rutgers.edu

Language: English - Date: 2006-09-02 17:11:20
565Education in the Philippines / ASEAN University Network / University of the Philippines / MIT Sloan School of Management

EXPERT’S PROFILE Name of Grantee Area of Expertise Inclusive Date of Contract as BSP Awardee Host Institution

Add to Reading List

Source URL: bsp.dost.gov.ph

Language: English - Date: 2014-10-27 21:47:03
566Medical terms / Medical informatics / Hospice / Association of Telehealth Service Providers / Medical guideline / Pain management / Deep vein thrombosis / Medicine / Health / Anesthesia

SIGN Scottish Intercollegiate Guidelines Network Audit tool for SIGN Guideline 77: postoperative management in adults

Add to Reading List

Source URL: www.sign.ac.uk

Language: English - Date: 2014-05-12 05:09:22
567Software / System administration / SolarWinds / Windows Server System / Windows Server / Microsoft SQL Server / Server / Zenoss / Windows Small Business Server / Network management / System software / Information technology management

DATASHEET SOLARWINDS SERVER & APPLICATION MONITOR Expert-Level Application Monitoring that You Can Set Up in Minutes DOWNLOAD FREE TRIAL

Add to Reading List

Source URL: cdn.swcdn.net

Language: English - Date: 2015-03-12 16:19:09
568Public-key cryptography / Key management / Kerberos / Virtual synchrony / Cryptography / Cryptographic protocols / Computer network security

The Cost of Adding Security Services to Group Communication Systems Cristina Nita-Rotaru Advisor: Dr. Yair Amir Submitted in partial fulfillment of the Ph.D. qualifiers Department of Computer Science

Add to Reading List

Source URL: www.cnds.jhu.edu

Language: English - Date: 2013-09-18 16:37:35
569System software / Data management / PRTG Network Monitor / Paessler Router Traffic Grapher / Relational database management systems / Paessler / Microsoft SQL Server / Database / Database management systems / Information technology management / Network management

PRTG Dat a Ext ract or © 2015 Paessler AG All rights reserved. No parts of this work may be reproduced in any form or by any means—graphic, electronic, or mechanical, including photocopying, recording, taping, or inf

Add to Reading List

Source URL: download-cdn.paessler.com

Language: English - Date: 2015-01-28 08:57:54
570Computer security / Virtual private networks / Internet privacy / Computer networking / Network performance / Unified threat management / Layer 2 Tunneling Protocol / Proxy server / Network security / Computing / Computer network security / Internet

GB-2100 Firewall UTM Appliance The GB-2100 Firewall UTM Appliance provides powerful, comprehensive protection and network reliability for SME organizations. Comprehensive Protection in a Single Unified Threat Management

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2014-10-21 12:02:08
UPDATE