Network Security

Results: 23614



#Item
281Computing / Computer security / Computer network security / E-commerce / Cyberwarfare / Information privacy / Payment Card Industry Data Security Standard / Cogeco / Web application firewall / Application firewall / Peer 1 / Denial-of-service attack

COGECO_Peer_1_Logo_v2_WHITE

Add to Reading List

Source URL: www.cogecopeer1.com

Language: English - Date: 2016-07-20 15:41:15
282Wireless sensor network / Wireless networking / Computing / Wireless / Technology / Sensor node / Wireless ad hoc network / Linear network coding / ANT / Computer security / Peer-to-peer / Draft:Energy related security attacks

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-12 08:33:06
283Cyberwarfare / Computing / Security / Hacking / Computer network security / Malware / Server / Computer security / CSC Version 6.0 / Cyber-collection

THE PROJECTSAURON APT Global Research and Analysis Team VersionAugust 9, 2016) The ProjectSauron APT

Add to Reading List

Source URL: cdn.securelist.com

Language: English - Date: 2016-08-09 10:39:42
284Computing / Software / Security / Data management / Cyberwarfare / Secure communication / Computer network security / Computer security / Cryptography / Big data / Git / Data security

Microsoft PowerPoint - Security _ A Big Question for Big Data.ppt [Compatibility Mode]

Add to Reading List

Source URL: www.ischool.drexel.edu

Language: English - Date: 2014-02-06 12:27:42
285Security / Video surveillance / Surveillance / Prevention / Safety / Video / Physical security / IP camera / Internet Protocol / Closed-circuit television / NVR / Axis Communications

Figure1_Basic Network Layout

Add to Reading List

Source URL: www.surveon.com

Language: English - Date: 2013-01-30 02:50:08
286Domain name system / Internet / Computing / Network architecture / DNS spoofing / Domain Name System Security Extensions / Name server / DNS zone / Pharming / Comparison of DNS server software / Google Public DNS

DNS Threat Analysis Mark Santcroos∗, Olaf M. Kolkman†NLnet Labs www.nlnetlabs.nl NLnet Labs document 2006-SE-01 version 1.0 ∗

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:10
287Computing / Security / Computer security / Computer network security / Application security / Data center / Arxan Technologies / Software Development Security

Arxan Best Practices White Paper 7 Key Factors of a Highly Effective Application Protection Solution Abstract: This whitepaper discusses the key factors that enable an effective application protection solution -that mit

Add to Reading List

Source URL: www.arxan.com

Language: English - Date: 2016-08-01 23:51:09
288Computing / Network architecture / Computer architecture / Cyberwarfare / Computer network security / Data security / IP multicast / Overlay network / Denial-of-service attack / Anycast / Database trigger / Firewall

Towards a More Functional and Secure Network Infrastructure Daniel Adkins Karthik Lakshminarayanan Adrian Perrig Ion Stoica UC Berkeley UC Berkeley CMU

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2003-06-05 12:41:23
289

Greenbone Security Manager www.greenbone.net x-ray your network

Add to Reading List

Source URL: www.greenbone.de

Language: German - Date: 2016-08-19 11:06:48
    290Labour relations / Economy / Business / Employment / Indian labour law / Trade union / Labour law / Labour movement / Draft:Legal protection and social security in unorganized sector with special references in India / Minimum Wages Act

    YEMAYA From Asia/ India Harsh working conditions…. The National Campaign on Labour Rights (NCLR), India—a network of trade unions and other support

    Add to Reading List

    Source URL: indianfisheries.icsf.net

    Language: English - Date: 2012-04-16 01:25:15
    UPDATE