Internet layer

Results: 1652



#Item
981Public-key cryptography / Internet protocols / Cryptographic software / Transport Layer Security / HTTP Secure / OpenSSL / Public key certificate / Certificate authority / Cipher suite / Cryptography / Secure communication / Cryptographic protocols

REN-ISAC SECURITY ALERT Muzzling the POODLE (While Cleaning Up Other Related Vulnerabilities, Too) October 22, 2014 To: IT Executives and Security Staff EXECUTIVE SUMMARY There have been many recent security advisories i

Add to Reading List

Source URL: www.ren-isac.net

Language: English - Date: 2014-10-22 14:59:58
982Secure communication / Internet / Data / Internet protocols / Internet standards / Transport Layer Security / Security Assertion Markup Language / Password / SAML 2.0 / Computing / Teleconferencing / Cryptographic protocols

Zoom Security White Paper May 2013 Zoom offers the first Unified Meeting Experience (UMX), a cloud service that provides a 3-in-1 meeting platform with HD video conferencing, mobility and web meetings. UMX also offers th

Add to Reading List

Source URL: d24cgw3uvb9a9h.cloudfront.net

Language: English - Date: 2015-01-19 02:15:03
983Tunneling protocols / Data / Internet protocols / Computer network security / Virtual private networks / IPsec / Internet Key Exchange / Layer 2 Tunneling Protocol / Internet security / Cryptographic protocols / Computing / Network architecture

Microsoft Word - CSG-01_G_english.DOC

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2015-01-25 12:12:19
984Public-key cryptography / Cryptographic software / Secure communication / Transport Layer Security / SHA-2 / Digital signature / Key / IPsec / X.509 / Cryptography / Cryptographic protocols / Internet protocols

Microsoft Word - CSG-01_S_english.DOC

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2015-01-25 11:42:22
985Information / Computer network security / Deep packet inspection / Online chat / Secure Shell / SOCKS / Application layer / Communications protocol / Daemon / Computing / Data / Internet protocols

Protocol Misidentification Made Easy with Format-Transforming Encryption Kevin P. Dyer Scott E. Coull

Add to Reading List

Source URL: kpdyer.com

Language: English - Date: 2014-11-02 17:58:24
986Internet / Network architecture / Internet standards / Transmission Control Protocol / Transport layer / Honeypot / User Datagram Protocol / Network intrusion detection system / Denial-of-service attack / Computer network security / Computing / Internet protocols

Honeycomb – Creating Intrusion Detection Signatures Using Honeypots Christian Kreibich, Jon Crowcroft University of Cambridge Computer Laboratory JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom firstname.lastname

Add to Reading List

Source URL: usacac.army.mil

Language: English - Date: 2008-09-08 11:55:19
987Electronic commerce / Internet protocols / Internet standards / Secure communication / Public-key cryptography / McAfee / Firefox / Transport Layer Security / Network Security Services / Software / Computing / Cryptography

Solution Brief Counterattacking BERserk Restoring the “trust” in trusted connectivity.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-12-05 18:25:15
988Cryptographic protocols / URI schemes / Internet protocols / Firefox / Transport Layer Security / HTTP Secure / Internet Explorer / Web browser / About URI scheme / Software / Google Chrome / Secure communication

Microsoft Word - Chestnut Announcement[removed]docx

Add to Reading List

Source URL: wits.idaho.gov

Language: English - Date: 2014-10-21 10:19:38
989Secure communication / Computing / Internet / Internet standards / Cryptographic software / Transport Layer Security / Cipher suite / RC4 / Password / Internet protocols / Cryptography / Cryptographic protocols

SSL/TLS Deployment Best Practices

Add to Reading List

Source URL: www.ssllabs.com

Language: English - Date: 2014-12-05 16:38:54
990Internet / Email client / Internet Message Access Protocol / Post Office Protocol / Message transfer agent / Gmail / Transport Layer Security / Mail / Comparison of webmail providers / Email / Computing / Computer-mediated communication

Setting Up Microsoft® Outlook 2007 Technical Manual: Configuration and Setup Setting Up a POP3 Email Account Document Updated: 2/09 8. Enter the following information:

Add to Reading List

Source URL: www.cira.state.tx.us

Language: English - Date: 2012-12-19 11:35:43
UPDATE