Internet protocols

Results: 10195



#Item
201Communications protocol / Internet protocols / Computing / Data

Observing Internet Path Transparency 
 to Support Protocol Engineering Brian Trammell <> Mirja Kühlewind <> IRTF & ISOC Workshop on Research and Applications of In

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2015-10-29 00:54:14
202Computing / Malware / Internet / Domain name system / Cyberwarfare / Internet Standards / Internet protocols / Ransomware / Infoblox / Botnet / Denial-of-service attack / Domain Name System Security Extensions

Infoblox_diamond_open_pattern

Add to Reading List

Source URL: www.infoblox.com

Language: English - Date: 2016-08-17 03:40:37
203Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Data transmission / Handshaking / Network architecture / Authenticated encryption / Transport Layer Security

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer Christian Badertscher1, Christian Matt1, Ueli Maurer1, Phil Rogaway2, Björn Tackmann3 1ETH

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
204Computing / Network architecture / OSI protocols / Media technology / Computer networking / Local area networks / Internet protocol suite / Virtual LAN / Network switch / Network layer / Firewall / Communications protocol

Affordable. Flexible. OnTarget. A Solid Technical Foundation is Critical for; Selling, Designing, Implementing and Maintaining Communications Products and Solutions. The Foundational Technology Assessment is focused on t

Add to Reading List

Source URL: cdn.westnetlearning.com

Language: English - Date: 2014-03-06 12:57:30
205Internet / Computing / Internet protocols / Internet Engineering Task Force / IETF Administrative Oversight Committee / Subpoena / Hypertext Transfer Protocol

Fees  Policy  for  Legal  Requests  6  September  2012     Abstract:     This  policy  imposes  standard  fees  to  produce  information  and  authenticate  d

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2015-12-02 12:03:34
206Computing / World Wide Web / Software / Hypertext Transfer Protocol / Internet protocols / Network protocols / Common Gateway Interface / HTML / Apache HTTP Server / POST / HTTP compression / Web Calendar Access Protocol

HTTP - MESSAGE EXAMPLES http://www.tutorialspoint.com/http/http_message_examples.htm Copyright © tutorialspoint.com Example 1

Add to Reading List

Source URL: www.tutorialspoint.com

Language: English - Date: 2015-09-30 15:33:55
207Computing / Network architecture / Internet / World Wide Web / Internet protocols / Hypertext Transfer Protocol / Web development / Internet security / SPDY / HTTP/2 / HTTP pipelining / WebSocket

Can SPDY Really Make the Web Faster? 1 Yehia 1 Lancaster University, UK

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2014-04-01 09:22:42
208Software / Computing / Digital media / Video surveillance / Multimedia / Network protocols / Digital television / Internet television / IP camera / Real Time Streaming Protocol / ONVIF / Streaming media

® Luxriot VMS Software Luxriot is an open architecture Video Management System (VMS). Luxriot accepts MJPEG, MPEG4 and H.264 as well as HD and megapixel video streams

Add to Reading List

Source URL: www.luxriot.com

Language: English - Date: 2016-05-08 15:59:44
209Computing / Network architecture / Computer network security / Tunneling protocols / Virtual private networks / Internet protocols / Cryptographic protocols / IPsec / Internet security / Transport Layer Security / SoftEther VPN / Secure Socket Tunneling Protocol

Security Review: SSL VPNs —Frederick M. Avolio Executive Summary Today’s enterprises use the Internet to meet a variety of communication needs among employees, business partners, suppliers, customers, and potential c

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2007-12-29 18:01:44
210Computing / Internet / Spamming / Domain name system / Cyberspace / Internet Standards / Internet protocols / Cybercrime / Domain name / Pharming / WHOIS / Phishing

Acceptable Use and Anti-Abuse Policy This policy sets forth activities that the Registry Operator considers abusive use of the .shop TLD, and actions the Registry may take in response. Abusive use may be reported to: GM

Add to Reading List

Source URL: nic.shop

Language: English - Date: 2016-05-29 23:08:53
UPDATE