Network Computer

Results: 31604



#Item
711Computing / Software / BIOS / Computer architecture / Cyberwarfare / Rootkit / Firmware / Broadcom / Booting

How to develop a rootkit for Broadcom NetExtreme network cards Guillaume Delugr´e Sogeti / ESEC R&D guillaume(at)security-labs.org

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
712Computer network security / Computer security / Cyberwarfare / Computing / Personal firewall / Firewall / Jump server / Distributed firewall / Comparison of firewalls

AppGate Distributed Device Firewall – Datasheet AppGate® Distributed Device Firewall Protecting user devices and the network

Add to Reading List

Source URL: www.cryptzone.com

Language: English - Date: 2015-04-28 16:57:36
713Cyberwarfare / Denial-of-service attacks / Internet Relay Chat / Computer network security / Security / Computing / Denial-of-service attack / DDoS mitigation / Computer security / Prolexic Technologies

DDoS Attack Mitigation Service Terms and Conditions The Sure DDoS Attack Mitigation Service provides the Customer with a solution to help protect the Customer site against Distributed Denial of Service (DDoS) attacks by

Add to Reading List

Source URL: web.sure.com

Language: English - Date: 2015-10-01 03:02:11
714Computer networking / Flow control / Network performance / TCP congestion control / Network topology / Scone /  Perth and Kinross / End-to-end delay

SCONE: A Tool to Estimate Shared Congestion Among Internet Paths Weidong Cui, Sridhar Machiraju, Randy H. Katz, Ion Stoica EECS Department, University of California, Berkeley

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-05-11 21:32:49
715Prevention / Security / Safety / National security / Computer network security / Cyberwarfare / Computer security / Resilience / DHS National Protection and Programs Directorate / Enterprise risk management / Threat / Insurance

Microsoft Word - Regulatory and Market Imperatives Place Cyber Security High on Carrier Agendas - CMM Reprint

Add to Reading List

Source URL: www.brokerslink.com

Language: English - Date: 2015-04-27 09:55:18
716Computer security / Software / Security / Computer network security / Crime prevention / National security / Antivirus software / Intrusion detection system / Avira / Center for Internet Security / Attack / Security alarm

ALDR: A New Metric for Measuring Effective Layering of Defenses ∗ Nathaniel Boggs Department of Computer Science Columbia University

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
717Computing / Network architecture / Computer network security / Tunneling protocols / Virtual private networks / Internet protocols / Cryptographic protocols / IPsec / Internet security / Transport Layer Security / SoftEther VPN / Secure Socket Tunneling Protocol

Security Review: SSL VPNs —Frederick M. Avolio Executive Summary Today’s enterprises use the Internet to meet a variety of communication needs among employees, business partners, suppliers, customers, and potential c

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2007-12-29 18:01:44
718Computing / Network architecture / Internet / Routing / Internet Standards / Computer networking / Ethernet / Forwarding plane / Router / Forwarding information base / Control plane / Ingress filtering

IMPLEMENTING ADDRESS ASSURANCE IN THE INTEL IXP ROUTER Michael Burns, Gregory Prier, Jelena Mirkovic, Peter Reiher UCLA {mburns, greg, sunshine, reiher}@cs.ucla.edu

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2006-07-12 20:45:50
719Computing / Network architecture / Network protocols / Computer network security / Application server / Software architecture / Load balancing / Hypertext Transfer Protocol / Middlebox / Transmission Control Protocol / Web server

xOMB: Extensible Open Middleboxes with Commodity Servers James W. Anderson, Ryan Braud, Rishi Kapoor, George Porter, and Amin Vahdat University of California, San Diego {jwanderson,rbraud,rkapoor,gmporter,vahdat}@cs.ucs

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2013-02-20 11:32:27
720Security / Computer security / Prevention / National security / Cyberwarfare / Computer network security / Cryptography / NIST Special Publication 800-53 / Test and evaluation master plan / Vulnerability / Threat / Information security

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DCAUG

Add to Reading List

Source URL: www.dote.osd.mil

Language: English - Date: 2015-06-12 16:42:00
UPDATE