Network Security

Results: 23614



#Item
791Computer network security / Sqrrl / Computer security / Crime prevention / Cryptography / National security / Threat / Authentication / Hunting / Carbon Black

Threat Hunting from Network to Endpoint July 2016 | Target. Hunt. Disrupt. Presenters Jim Raine

Add to Reading List

Source URL: sqrrl.com

Language: English - Date: 2016-07-21 11:15:01
792Ubiquitous computing / Computer network security / Smart card / Server / Radio-frequency identification / FamilyNet / Computer security / Credit card

FamilyNet: A Tangible Interface for Managing Intimate Social Networks Wendy E. Mackay & Michel Beaudouin-Lafon in|situ| : INRIA Futurs & LRI Université Paris-Sud, Bâtiment 490, 91405 Orsay Cedex, France

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-06-21 09:58:21
793Mobile technology / Computer access control / Identity management / Security Assertion Markup Language / Mobile network operator / Diameter

An Integrated Accounting and Charging Architecture for Mobile Grids Cristian Morariu, Martin Waldburger, Burkhard Stiller

Add to Reading List

Source URL: gridnets.org

Language: English - Date: 2010-08-10 03:54:15
794Spam filtering / Computer network security / Cybercrime / E-commerce / Cloudmark / Text messaging / Short Message Service / Messaging security / Spamming / Computer security

Microsoft Word - Cloudmark_Mobile_Datasheet_Q4_14.docx

Add to Reading List

Source URL: www.cloudmark.com

Language: English - Date: 2014-11-19 19:26:51
795Cyberwarfare / Computer network security / Crime prevention / National security / E-commerce / Mobile security / Malware / Computer security

MAIK MORGENSTERN / CTO AV-TEST Internet Security Days 2015 EVERYTHING IS A TARGET YOUR HEALTH DATA IS NEXT

Add to Reading List

Source URL: www.av-test.org

Language: English - Date: 2015-09-21 03:31:29
796Cyberwarfare / Cybercrime / National security / Computer network security / Computer security / Cryptography / Federal Energy Regulatory Commission / Critical infrastructure protection

[Presenter’s Name] [Presenter’s Title]

Add to Reading List

Source URL: www.wecc.biz

Language: English - Date: 2016-05-26 17:33:49
797Spamming / Computer network security / Multi-agent systems / Botnets / Cybercrime / Email spam / Phishing / Computer worm / The Spamhaus Project / Anti-spam techniques / Zombie / Bagle

Be certain MessageLabs Intelligence: April 2006 Catch Me If You Can: A Review of QuarterIntroduction Welcome to the April edition of the MessageLabs Intelligence monthly report. This report provides the latest t

Add to Reading List

Source URL: londonactionplan.org

Language: English - Date: 2016-04-26 15:59:20
798Crime prevention / Cryptography / Information governance / National security / Computer network security / Computer security / Telecommuting / Cisco Systems / Network administrator

SENIOR NETWORK ENGINEER SUMMARY: Responsible for managing the core network infrastructure within all of the MCCA’s facilities. This individual will ensure compliance with best practices in the area of network operation

Add to Reading List

Source URL: massconvention.com

Language: English - Date: 2015-12-09 12:04:21
799Computer network security / Cyberwarfare / Cybercrime / Computer security / E-commerce / Man-in-the-browser / Denial-of-service attack / Internet security / Password / Threat / Web application firewall / Threat Intelligence Platform

ShapeAdvancedAppDefense_DataSheet

Add to Reading List

Source URL: www.shapesecurity.com

Language: English - Date: 2016-08-12 14:49:28
800National security / Computer network security / Computer security / Crime prevention / Cryptography / Cyberwarfare / Airport / State Secretariat of Civil Aviation / Directorate General of Civil Aviation

Presentation on Aviation Sector to Stakeholders-PDF

Add to Reading List

Source URL: aviation.gov.ng

Language: English
UPDATE