Network Security

Results: 23614



#Item
451Computing / Network architecture / Computer network security / Tunneling protocols / Virtual private networks / Internet protocols / Cryptographic protocols / IPsec / Internet security / Transport Layer Security / SoftEther VPN / Secure Socket Tunneling Protocol

Security Review: SSL VPNs —Frederick M. Avolio Executive Summary Today’s enterprises use the Internet to meet a variety of communication needs among employees, business partners, suppliers, customers, and potential c

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2007-12-29 18:01:44
452Computing / Network architecture / Network protocols / Computer network security / Application server / Software architecture / Load balancing / Hypertext Transfer Protocol / Middlebox / Transmission Control Protocol / Web server

xOMB: Extensible Open Middleboxes with Commodity Servers James W. Anderson, Ryan Braud, Rishi Kapoor, George Porter, and Amin Vahdat University of California, San Diego {jwanderson,rbraud,rkapoor,gmporter,vahdat}@cs.ucs

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2013-02-20 11:32:27
453Security / Computer security / Prevention / National security / Cyberwarfare / Computer network security / Cryptography / NIST Special Publication 800-53 / Test and evaluation master plan / Vulnerability / Threat / Information security

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DCAUG

Add to Reading List

Source URL: www.dote.osd.mil

Language: English - Date: 2015-06-12 16:42:00
454Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Computer access control / Internet Standards / Internet protocols / Transport Layer Security / OpenSSL / Authentication / Password

eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirchen

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:18:07
455Computing / Computer security / Cyberwarfare / Computer network security / Hacking / Cross-site scripting / Vulnerability / OWASP / Software quality / Application security / Software / Security

Microsoft PowerPoint - DenimGroup_IntroductionToApplicationSecurity.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:17:57
456Computing / Network architecture / Internet / Internet Standards / Internet protocols / Computer network security / TACACS / IP address / Transmission Control Protocol / Simple Network Management Protocol / RADIUS / File Transfer Protocol

LX-Series Configuration Guide Corporate Headquarters MRV Communications, Inc. Corporate CenterNordhoff Street

Add to Reading List

Source URL: pbxbook.com

Language: English - Date: 2015-09-02 09:36:53
457Internet / Computing / E-commerce / Internet security / Secure communication / Transport Layer Security / Network architecture

KYLE GRAHAM SCHOMP 364 Riverway, #26 Boston, MA5473 https://kyle.schomp.info/

Add to Reading List

Source URL: kyle.schomp.info

Language: English - Date: 2016-05-31 23:40:45
458Wireless sensor network / Cameras / Cinematography / Filmmaking / Technology / Computing / Pantiltzoom camera / Security engineering / Video / Sensor node / Visual sensor network / Video camera

MultiSense: Fine-grained Multiplexing for Steerable Camera Sensor Networks Navin K. Sharma, David E. Irwin, Prashant J. Shenoy and Michael Zink University of Massachusetts Amherst {nksharma,irwin,shenoy}@cs.umass.edu, zi

Add to Reading List

Source URL: www.ecs.umass.edu

Language: English - Date: 2014-08-13 10:33:24
459Technology / Computing / Security / Computer network security / Internet privacy / Cultural globalization / Internet / New media / Telegraphy / Content-control software / Educational technology / Computer security

INSTRUCTIONTechnology Usage Policy The Inter-Lakes School District (hereto referred as “District”) recognizes the value of computer and other

Add to Reading List

Source URL: www.inter-lakes.k12.nh.us

Language: English - Date: 2016-05-31 20:05:16
460Spamming / Computing / Computer network security / Multi-agent systems / Botnets / Concurrent computing / Command and control / Storm Worm / Email spam / Storm botnet / Kelihos botnet

Challenges in Experimenting with Botnet Detection Systems Adam J. Aviv Andreas Haeberlen University of Pennsylvania Abstract

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-07-08 13:42:23
UPDATE