Network Security

Results: 23614



#Item
961Computer network security / Cyberwarfare / Data security / Firewall / Network management / Computer security / Security Target / Guard / Common Criteria

Microsoft WordSertit 012 Maintenance Report v_5.0

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2015-07-03 04:33:47
962Cryptographic protocols / Internet protocols / IPsec / Tunneling protocols / Network architecture / Security Parameter Index / Internet security / Internet Key Exchange / Internet protocol suite / IPv6 / Transmission Control Protocol / Internet Security Association and Key Management Protocol

Microsoft PowerPoint - ch5.ppt [相容模式]

Add to Reading List

Source URL: people.cs.nctu.edu.tw

Language: English - Date: 2012-08-25 21:41:01
963Hacking / Software testing / Computer network security / Vulnerability / Cross-site scripting / Computer security / SQL injection

WHITEHAT SENTINEL SOURCE FOR MOBILE DA T A SHE E T WhiteHat Sentinel Source for Mobile

Add to Reading List

Source URL: www.whitehatsec.com

Language: English - Date: 2016-08-17 13:22:10
964Computer network security / Multi-agent systems / Spamming / Botnets / United States v. Nosal / Computer Fraud and Abuse Act / Zombie / Computer worm / Mariposa botnet / Conficker / Rustock botnet / Srizbi botnet

Testimony of Amie Stepanovich  Senior Policy Counsel, Access  on behalf of   Access and the Electronic Frontier Foundation  Before the Advisory Committee on Criminal Rules  on the Matter of P

Add to Reading List

Source URL: www.accessnow.org

Language: English - Date: 2015-09-14 16:04:23
965Software testing / Computer network security / Computer security / Penetration test / Vulnerability / Exploit / Attack / 0D

Intelligence Driven Security We are searching, with immediate effect, for highly motivated and technically competent Penetration Tester Red Teamer

Add to Reading List

Source URL: www.code-white.com

Language: English - Date: 2016-02-15 10:50:39
966Computer network security / Authentication protocols / BitLocker / Disk encryption / Windows 7 / Windows Server / Password / Kerberos

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
967Computer network security / Cross-platform software / FileZilla / Portable software / Password / Virtual private network / Outlook.com

How to get an access to the Main Storage System dapadfs Projects inside DAPA DAPA offer two different solutions for store data related to ongoing projects.  

Add to Reading List

Source URL: dapa.ciat.cgiar.org

Language: English - Date: 2015-02-20 09:16:32
968Crime prevention / National security / Cyberwarfare / Computer network security / Malware / Computer security / Mobile security

MAIK MORGENSTERN / CTO AV-TEST AVAR CONFRENCE 2015 YOU ARE THE TARGET IN THE IOT

Add to Reading List

Source URL: www.av-test.org

Language: English - Date: 2016-04-18 07:40:14
969Computer network security / Middlebox / Data-flow analysis / Scope / Transmission Control Protocol / Robust random early detection / ALGOL 68 / Subroutine / Parameter / Algorithm

Paving the Way for NFV: Simplifying Middlebox Modifications using StateAlyzr Junaid Khalid, Aaron Gember-Jacobson, Roney Michael, Anubhavnidhi Abhashkumar, Aditya Akella University of Wisconsin-Madison Abstract

Add to Reading List

Source URL: opennf.cs.wisc.edu

Language: English - Date: 2016-02-29 22:59:54
970Computer network security / Crime prevention / National security / E-commerce / Secure communication / Computer security / Vulnerability / Software

Microsoft PowerPoint - DenimGroup_RollingOutAnEnterpriseSourceCodeReviewProgram_Content.pptx

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:49
UPDATE