Network Security

Results: 23614



#Item
711United States intelligence agencies / National security / Computer network security / Counter-terrorism / Cyberwarfare / Islamic State of Iraq and the Levant / Federal Bureau of Investigation / Threat / National Counterterrorism Center / Computer security / Joint Terrorism Task Force / United States Department of Homeland Security

Microsoft Word - terror211.doc

Add to Reading List

Source URL: docs.house.gov

Language: English
712Domain name system / Internet protocols / Internet Standards / Domain Name System Security Extensions / Name server / DNS zone / Content delivery network / IPv6 / Uniform Resource Name / DNS spoofing / Time to live

Internet Engineering Task Force (IETF) Request for Comments: 7871 Category: Informational ISSN: C. Contavalli

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2016-05-20 16:24:42
713Generally Accepted Accounting Principles / Cyberwarfare / Denial-of-service attacks / Internet Relay Chat / Financial statements / Statement of changes in equity / Earnings before interest /  taxes /  depreciation /  and amortization / Financial ratio / Balance sheet / Denial-of-service attack / Investment / DDoS mitigation

26 MarchCorero Network Security plc (AIM: CNS) (“Corero” or the “Company”) Full year results

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2015-03-26 04:51:36
714Cybercrime / Crime prevention / National security / Computer network security / Computer security / Cryptography

SLCC Partnership Form This form is for non-employees that need an S# and/or computer access because of the nature of their relationship with SLCC. Partners usually are employed by another entity but provides service to

Add to Reading List

Source URL: i.slcc.edu

Language: English - Date: 2016-08-19 18:15:43
715

Women Peace Security – reloaded Sicherheitspolitik und Friedensförderung aus der Genderperspektive Podiumsgespräch

Add to Reading List

Source URL: wide-network.ch

Language: German - Date: 2015-10-06 11:12:22
    716Cybercrime / Cyberwarfare / Cyberinfrastructure / E-Science / Horizon / European Union Agency for Network and Information Security / Net neutrality / Computer security

    ACM - Europe Public Policy Committee (EUACM) October newsletter LAW AND POLICY Cybersecurity

    Add to Reading List

    Source URL: europe.acm.org

    Language: English - Date: 2015-12-14 16:16:59
    717Cyberwarfare / Computer network security / Computer security / National security / Cryptography / Denial-of-service attack / Malware / Threat / Information security / Vulnerability / Antivirus software / Kaspersky Lab

    Available online at www.postmodernopenings.com e-ISSN: 2069–9387; ISSN–L: 2068–0236 Postmodern Openings 2016, Volume 7, Issue 1, June, pp

    Add to Reading List

    Source URL: postmodernopenings.com

    Language: English - Date: 2016-06-27 06:38:15
    718Computer network security / Computer security / Hacking / Software testing / Vulnerability / Application security / Web application firewall

    Microsoft PowerPoint - VulnerabilityManagementInAnApplicaitonSecurityWorld_OWASPMSP_20090316.ppt [Compatibility Mode]

    Add to Reading List

    Source URL: denimgroup.com

    Language: English - Date: 2014-01-13 18:21:43
    719Cybercrime / Cyberwarfare / Computer network security / Computer security / Cryptography / National security / Horizon / Big data / Internet of things

    ACM Europe Policy Committee January 2016 newsletter EUACM NEWS EUACM established a one year partnership with Science|Business and is now part of their member network. Science|Business links more than 30 partners in a hi

    Add to Reading List

    Source URL: europe.acm.org

    Language: English - Date: 2016-02-01 13:51:03
    720Computer network security / Cybercrime / National security / Computer security / Cryptography / Threat

    INNOVATION AND TECHNOLOY FUND Post Project Evaluation Form for ITSP Projects Undertaken by Designated Local Public Research Institute Notes for Completion This evaluation form comprises two parts which should be complet

    Add to Reading List

    Source URL: www.itf.gov.hk

    Language: English - Date: 2016-06-23 05:47:04
    UPDATE