In-network management

Results: 4346



#Item
941Spamming / Computer security / Spam filtering / PHP programming language / Content management systems / WordPress / Spam in blogs / Anti-spam techniques / Denial-of-service attack / Software / Computing / Computer network security

Hardening WordPress (or, How Not To Get Hacked, Then What to Do When You Are) # Resources Codex Blog.Sucuri.net Add to Reading List

Source URL: dotgray.com

Language: English - Date: 2015-03-15 17:14:30
942Supply chain management / Manufacturing / Marketing / Bullwhip effect / Economic crises / Beer distribution game / Supply chain / Dynamic decision-making / Inventory / Business / Technology / Management

The Emergence of Stability in Diverse Supply Chains Owen Densmore The Santa Fe Institute Business Network ValueNet Team The distribution of products from manufacturer to distributor to wholesaler and finally to retailer

Add to Reading List

Source URL: backspaces.net

Language: English - Date: 2008-02-27 23:12:52
943Health economics / Healthcare in the United Kingdom / National Health Service / Nursing in the United Kingdom / File Transfer Protocol / Nursing / Advertising / Operating room management / Health / Internet / Network architecture

ORNACJOURNAL 2015 ADVERTISING RATE SHEET ORNAC Journal is a quarterly peer-reviewed Journal written by Registered Nurses for Registered Nurses. It is the official publication of Operating Room Nurses Association of Canad

Add to Reading List

Source URL: www.ornac.ca

Language: English - Date: 2014-07-10 13:42:39
944Telecommunications engineering / Network performance / Software-defined radio / Data transmission / Channel / Radio resource management / Throughput / IEEE 802.11 / Communications protocol / Information / Data / Information theory

In Defense of Wireless Carrier Sense Micah Z. Brodsky Robert T. Morris MIT CSAIL

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2009-08-01 04:31:59
945Crime prevention / National security / Gemalto / Computer network security / Federal Information Security Management Act / Multi-factor authentication / Information security / Authentication / Security / Smart cards / Computer security

Major U.S. student loan servicing agency implements Gemalto’s authentication to comply with federal security standards Amsterdam, March 12, 2015 – Gemalto (Euronext NL0000400653 GTO), the world leader in digital secu

Add to Reading List

Source URL: hugin.info

Language: English - Date: 2015-03-11 07:54:26
946Management / Global sourcing / International trade / Sourcing / Brand / Li & Fung / Business / Outsourcing / Procurement

Global Sourcing Strategy in US Fashion Business S. Y. KIM 21세기의 새로운 흐름 Network

Add to Reading List

Source URL: www.kofoti.or.kr

Language: English - Date: 2012-09-27 22:28:28
947File sharing networks / Cloud storage / Peer-to-peer computing / Peercasting / Networks / Content delivery network / Web portal / Peer-to-peer / Real Time Streaming Protocol / Concurrent computing / Computing / Distributed computing

Scalable Internet Services Enhanced Streaming Services in a Content Distribution Network Prism’s content naming, management, discovery, and

Add to Reading List

Source URL: spar.isi.jhu.edu

Language: English - Date: 2004-04-09 15:38:54
948Internet standards / FTP / Network management / SolarWinds / System administration / Serv / FTPS / File Transfer Protocol / File server / Computing / Internet / Network architecture

Copyright © SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in p

Add to Reading List

Source URL: www.serv-u.com

Language: English - Date: 2014-10-27 14:31:14
949Network performance / Mathematical optimization / Business / Technology / Operations research / Information technology management / Infrastructure optimization

BUSINESS OPTIMIZATION ANALYST Western Forest Products Inc. is currently seeking a highly motivated individual with experience in analysis, industry software applications, financial acumen and a strategic problem-solving

Add to Reading List

Source URL: www.canadian-forests.com

Language: English - Date: 2015-04-07 17:14:52
950Computer network security / Federated identity / Identity management / Kerberos / Single sign-on / Authentication / Access token / Principal / Authorization / Security / Computer security / Access control

Accountability and Control of Process Creation in Metasystems Marty Humphrey, Frederick Knabe, Adam Ferrari, and Andrew Grimshaw Department of Computer Science University of Virginia Charlottesville, VA

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2001-09-17 13:13:14
UPDATE