Messaging Security

Results: 466



#Item
61Computing / Hacking / Software testing / Alert correlation / Attack / Alert messaging / Buffer overflow / Vulnerability / Denial-of-service attack / Cyberwarfare / Computer security / Computer network security

Techniques and Tools for Analyzing Intrusion Alerts PENG NING, YUN CUI, DOUGLAS S. REEVES, and DINGBANG XU North Carolina State University Traditional intrusion detection systems (IDSs) focus on low-level attacks or anom

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:18
62Apache Axis2 / Java specification requests / Middleware / Apache Axis / SOAP with Attachments API for Java / Message-oriented middleware / WS-Security / SOAP / Communications protocol / Computing / Web services / Java enterprise platform

Proposal for the Axis2 core The Goal To implements a one-way Messaging based, extensible base for the Apache Axis2. Following behaviors are already agreed upon. • Extensibility is achieved by the means of interceptors,

Add to Reading List

Source URL: people.apache.org

Language: English - Date: 2005-03-28 09:29:18
63Denial-of-service attack / Computing / Computer network security / Alert correlation / Alert messaging

Constructing Attack Scenarios through Correlation of Intrusion Alerts Peng Ning Yun Cui

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:01
64Technology / Online chat / Crime prevention / Data security / Information security / National security / Instant messaging / Records management / EGovernment in Europe / Computing / Computer-mediated communication / Email

Policies & Procedures Information and Communication Technology Services Curtin University of Technology Sarawak Campus POLICIES AND PROCEDURES Version 1.0

Add to Reading List

Source URL: www.curtin.edu.my

Language: English - Date: 2008-06-09 22:57:23
65Internet / Email / Cyberwarfare / Internet Relay Chat / Online chat / Firewall / Instant messaging / Denial-of-service attack / Internet security / Computing / Computer network security / Computer-mediated communication

Nusoft Newsletter – IR Series No.2 Tech Overview : Effective Record Searching Businesses utilize developments in Internet technology to improve efficiency across a range of

Add to Reading List

Source URL: www.nusoft.com.tw

Language: English - Date: 2012-10-23 00:46:24
66Computer-mediated communication / Email / Secure messaging / Gmail / Google Apps / Google Talk / Instant messaging / Secure communication / Transport Layer Security / Computing / Internet privacy / Internet

Google Message Encryption ABOUT GOOGLE APPS Google Apps is a suite of applications that includes Gmail, Google Calendar (shared calendaring), Google Talk

Add to Reading List

Source URL: www.spaminabox.co.za

Language: English - Date: 2009-06-09 06:29:13
67Data distribution service / Security / Computing / Authentication / OpenSplice DDS / Middleware / System software / Real-Time Innovations

RTI Connext DDS Secure Secure Messaging for Intelligent Machines RTI Connext™ DDS Secure provides the world’s first off-the-shelf messaging platform that delivers the security, performance and safety required for dep

Add to Reading List

Source URL: www.rti.com

Language: English - Date: 2015-04-10 15:34:03
68Technology / Social media / Real-time web / Text messaging / Websites / Reblogging / Tumblr. / Geocoding / World Wide Web / Twitter / Social information processing

Performance analysis of OFDM modulation on indoor broadband PLC channels

Add to Reading List

Source URL: www.security-informatics.com

Language: English
69WS-ReliableMessaging / Enterprise application integration / WS-Reliability / WS-Notification / WS-Eventing / Globus Toolkit / Middleware / Service-oriented architecture / WS-Security / Computing / Web services / World Wide Web

For more information, visit: ptl.iu.edu NaradaBrokering NaradaBrokering is an open source technology supporting a suite of capabilities for reliable, robust, and flexible messaging. This middleware

Add to Reading List

Source URL: grids.ucs.indiana.edu

Language: English - Date: 2009-10-26 20:48:54
70Cross-platform software / Extensible Messaging and Presence Protocol / Online chat / Technology / XMPP Standards Foundation / Presence information / URI scheme / Simple Authentication and Security Layer / Transport Layer Security / Computing / Computer-mediated communication / Instant messaging

XEP-0170: Recommended Order of Stream Feature Negotiation Peter Saint-Andre mailto: xmpp: https://stpeter.im

Add to Reading List

Source URL: xmpp.org

Language: English - Date: 2014-04-08 13:12:24
UPDATE