Network Computer

Results: 31604



#Item
851Cyberwarfare / Computer security / Computer network security / Security / Vulnerability / Zero-day / Software bug

Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response Zhen Huang Mariana D’Angelo

Add to Reading List

Source URL: www.eecg.toronto.edu

Language: English - Date: 2016-03-14 12:44:49
8523D computer graphics / Visual effects / Geometry / Computer graphics / Triangle geometry / Triangle / Triangulated irregular network / Differential geometry of surfaces / 3D modeling / Computer representation of surfaces / Vertex / Graphics

A STEP TOWARDS INTERACTIVE DISPLAYS OF DIGITAL ELEVATION MODELS Thomas K. Poiker Lori A. Griswold Simon Fraser University

Add to Reading List

Source URL: mapcontext.com

Language: English - Date: 2008-08-29 23:58:00
853Computing / Computer architecture / Network architecture / Network protocols / Internet protocols / Communications protocol / Data transmission / Reliable multicast / Multicast / V / Reliability / SIMPLE

Lightweight Multicast KENNETH Cornell Causal and Atomic Group

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2004-03-02 14:47:21
854Computing / Feature model / Multiprotocol Label Switching / Wireless sensor network / Conceptual model / Class diagram

Automating the Configuration of Multi Software Product Lines Marko Rosenmu¨ller, Norbert Siegmund School of Computer Science University of Magdeburg, Germany {rosenmue,nsiegmun}@ovgu.de

Add to Reading List

Source URL: wwwiti.cs.uni-magdeburg.de

Language: English
855Computing / Software / Computer networking / Internet privacy / Network performance / Proxy server / Laredo /  Texas / Windows / Point and click / System software

Microsoft Word - download.doc

Add to Reading List

Source URL: fidlar.com

Language: English - Date: 2011-04-20 17:15:51
856Computing / Computer security / Cyberwarfare / Cryptographic protocols / Secure communication / Computer network security / Internet protocols / Computer access control / Cross-site scripting / Cheat sheet / Cross-site request forgery / Cheating in video games

OWASP Cheat Sheets Martin Woschek, April 9, 2015 Contents I

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-04-23 16:03:46
857Computing / Computer hardware / Computer data storage / Telecommunications engineering / Computer architecture / Storage area network / Backup / Logical volume management / File system / Standard RAID levels / Storage virtualization / Thin provisioning

Measuring and Improving Storage Utilization STOR-UTIL Introduction Measuring and Improving

Add to Reading List

Source URL: blog.fosketts.net

Language: English - Date: 2015-03-16 16:31:52
858Statistics / Computer security / Computer network security / Outlier / Statistical analysis / Anomaly / Threat

Sequential Feature Explanations for Anomaly Detection Md Amran Siddiqui, Alan Fern, Thomas G. Die8erich and Weng-Keen Wong School of EECS

Add to Reading List

Source URL: intelligence.org

Language: English - Date: 2016-05-31 11:21:14
859Computing / Security / Cyberwarfare / Computer security / Cybercrime / National security / Emerging technologies / Computer network security / Cloud computing / Smart grid / Cyber security standards / Cyber-physical system

Applied Cyber Security  ........................................................................................................................................... Overview  The    transformation    of    physi

Add to Reading List

Source URL: www.gian.iitkgp.ac.in

Language: English - Date: 2016-05-31 02:57:24
860Computing / Software / System software / Internet Protocol / Computer network security / Ping / Data security / TCP/IP stack fingerprinting / Cyberwarfare / Nmap / Raw socket / Internet protocol suite

Chatter on the Wire: A look at excessive network traffic and what it can mean to network security. by Eric Kollmann aka xnih v.1.0

Add to Reading List

Source URL: chatteronthewire.org

Language: English - Date: 2006-06-04 02:00:00
UPDATE