Network Security

Results: 23614



#Item
441Performance management / CVSS / Computer network security

D1.1.1 Project Management Handbook

Add to Reading List

Source URL: wikirate.eu

Language: English - Date: 2016-07-01 06:37:58
442Computing / Wireless / Bluetooth / Humancomputer interaction / Bluesnarfing / Computer security / Kali Linux / Fitbit / Wearable technology / Kismet / Security token / Java APIs for Bluetooth

Security of Bluetooth Network Data Traffic Michael Grant Williams DoD Contractor Iowa State University

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2016-06-13 23:23:06
443Chemistry / Matter / Health / Disinfectants / Water treatment / Hygiene / Oxidizing agents / Bactericides / Chlorine dioxide / Chlorine / Bacillus atrophaeus / CT Value

Drinking Water Network Security, Which is a Better Disinfectant; Chlorine or Chlorine Dioxide? Ahmed A. Hosni Research Assistant Professor Department of Civil Engineering, University of Nebraska-Lincoln Motivation

Add to Reading List

Source URL: watercenter.unl.edu

Language: English - Date: 2010-10-12 10:16:02
444Computing / Security / Cryptography / Data security / Information governance / Computer network security / Key management / Computer security / Apache Accumulo / Cloud computing security

Transitions A ROUNDUP OF LINCOLN LABORATORY TECHNOLOGY TRANSFER OPPORTUNITIES IN CYBER SECURITY Technology Transfer

Add to Reading List

Source URL: www.ll.mit.edu

Language: English - Date: 2016-07-12 15:25:15
445Computing / Software / BIOS / Computer architecture / Cyberwarfare / Rootkit / Firmware / Broadcom / Booting

How to develop a rootkit for Broadcom NetExtreme network cards Guillaume Delugr´e Sogeti / ESEC R&D guillaume(at)security-labs.org

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
446Computer network security / Computer security / Cyberwarfare / Computing / Personal firewall / Firewall / Jump server / Distributed firewall / Comparison of firewalls

AppGate Distributed Device Firewall – Datasheet AppGate® Distributed Device Firewall Protecting user devices and the network

Add to Reading List

Source URL: www.cryptzone.com

Language: English - Date: 2015-04-28 16:57:36
447Cyberwarfare / Denial-of-service attacks / Internet Relay Chat / Computer network security / Security / Computing / Denial-of-service attack / DDoS mitigation / Computer security / Prolexic Technologies

DDoS Attack Mitigation Service Terms and Conditions The Sure DDoS Attack Mitigation Service provides the Customer with a solution to help protect the Customer site against Distributed Denial of Service (DDoS) attacks by

Add to Reading List

Source URL: web.sure.com

Language: English - Date: 2015-10-01 03:02:11
448Computing / Network architecture / Internet / World Wide Web / Internet protocols / Hypertext Transfer Protocol / Web development / Internet security / SPDY / HTTP/2 / HTTP pipelining / WebSocket

Can SPDY Really Make the Web Faster? 1 Yehia 1 Lancaster University, UK

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2014-04-01 09:22:42
449Prevention / Security / Safety / National security / Computer network security / Cyberwarfare / Computer security / Resilience / DHS National Protection and Programs Directorate / Enterprise risk management / Threat / Insurance

Microsoft Word - Regulatory and Market Imperatives Place Cyber Security High on Carrier Agendas - CMM Reprint

Add to Reading List

Source URL: www.brokerslink.com

Language: English - Date: 2015-04-27 09:55:18
450Computer security / Software / Security / Computer network security / Crime prevention / National security / Antivirus software / Intrusion detection system / Avira / Center for Internet Security / Attack / Security alarm

ALDR: A New Metric for Measuring Effective Layering of Defenses ∗ Nathaniel Boggs Department of Computer Science Columbia University

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
UPDATE