Network Security

Results: 23614



#Item
351Security / Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / National security / Ambient intelligence / Privacy

Call for Papers Journal of Universal Computer Science (J.UCS) Special Issue Security, Privacy and Reliability of Smart Buildings Guest Editors: Jörg Keller

Add to Reading List

Source URL: www.jucs.org

Language: English - Date: 2016-06-08 08:50:45
352Computing / Security / Computer security / Content-control software / Computer network security / Fortinet / Emerging technologies / Cloud computing / Internet of things / Accelops

Fortinet Security Fabric White Paper

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2016-08-02 16:38:44
353Digital media / Security / Technology / Privacy of telecommunications / Cybercrime / Computer network security / Email / Internet privacy / Electronic Communications Privacy Act / Computer security / Internet / Privacy

ADMINISTRATIVE POLICY NOISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, iPads) I. POLICY ISSUANCE

Add to Reading List

Source URL: cityofsitka.com

Language: English - Date: 2015-08-13 16:32:14
354Software / Computing / System software / Computer network security / Iptables / Packet processing / Firewall / Netfilter / Communications protocol / Transmission Control Protocol / Ipfirewall / Statistical classification

Trees in the List: Accelerating List-based Packet Classification Through Controlled Rule Set Expansion Sven Hager Stefan Selent

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:55:48
355Security / Cyberwarfare / Prevention / Computer network security / Cybercrime / Email / Password / Computer security / Internet privacy / Rootkit / Computer virus / Internet

IT ACCEPTABLE USE STANDARDS PURPOSE A standard includes specific low level mandatory controls that help enforce and support a policy. The purpose of this document is to support and outline in detail

Add to Reading List

Source URL: bufa.ca

Language: English - Date: 2016-07-11 09:00:51
356Distributed data storage / Computing / Concurrent computing / File sharing networks / Distributed computing / File sharing / Kademlia / Kad network / Distributed computing architecture / Peer-to-peer / Overlay network / EMule

SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:40
357Software / Computing / Computer network security / Cloud clients / Portable software / Web browsers / Hypertext Transfer Protocol / Browser security / HTTP cookie / JavaScript / Google Chrome / Browser extension

Run-time Monitoring and Formal Analysis of Information Flows in Chromium Lujo Bauer Shaoying Cai? Limin Jia Timothy Passaro Michael Stroucken Carnegie Mellon University ? Institute for Infocomm Research

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
358Computer network security / Computing / Cyberwarfare / Firewall / DMZ / Information technology management

CyberGuard SG User Manual CyberGuard 7984 South Welby Park Drive #101 Salt Lake City, Utah 84084

Add to Reading List

Source URL: go.mcafee.com

Language: English - Date: 2005-10-17 21:55:19
359Computing / Computer data storage / Telecommunications engineering / Data management / Fibre Channel / XAM / Storage area networks / Network protocols / Storage security / ISO/IEC 27040

STORAGE NETWORKING STANDARDS Management and Administration Building a Working Knowledge of Storage Networking Operations through a clear understanding of Solutions & Technology For professionals who are implementing and

Add to Reading List

Source URL: www.sniaindia.org

Language: English - Date: 2012-04-10 08:25:35
360Security / Cyberwarfare / Computer network security / Computer security / Crime prevention / National security / Cyber threat intelligence / Threat / SCADA

Leveraging Threat Intelligence in an Active Defense 2016 Erick Mandt Intelligence Analyst

Add to Reading List

Source URL: files.sans.org

Language: English - Date: 2016-07-11 10:53:35
UPDATE