Network layer

Results: 1811



#Item
51Computing / Network architecture / OSI protocols / Media technology / Computer networking / Local area networks / Internet protocol suite / Virtual LAN / Network switch / Network layer / Firewall / Communications protocol

Affordable. Flexible. OnTarget. A Solid Technical Foundation is Critical for; Selling, Designing, Implementing and Maintaining Communications Products and Solutions. The Foundational Technology Assessment is focused on t

Add to Reading List

Source URL: cdn.westnetlearning.com

Language: English - Date: 2014-03-06 12:57:30
52Computing / Network architecture / Computer network security / Tunneling protocols / Virtual private networks / Internet protocols / Cryptographic protocols / IPsec / Internet security / Transport Layer Security / SoftEther VPN / Secure Socket Tunneling Protocol

Security Review: SSL VPNs —Frederick M. Avolio Executive Summary Today’s enterprises use the Internet to meet a variety of communication needs among employees, business partners, suppliers, customers, and potential c

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2007-12-29 18:01:44
53Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Computer access control / Internet Standards / Internet protocols / Transport Layer Security / OpenSSL / Authentication / Password

eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirchen

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:18:07
54Internet / Computing / E-commerce / Internet security / Secure communication / Transport Layer Security / Network architecture

KYLE GRAHAM SCHOMP 364 Riverway, #26 Boston, MA5473 https://kyle.schomp.info/

Add to Reading List

Source URL: kyle.schomp.info

Language: English - Date: 2016-05-31 23:40:45
55Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Certificate policy / Certificate authority / Revocation list / Public key certificate / X.509 / Authentication / Energy Sciences Network

DOE Grids Certificate Policy And Certification Practice Statement Version 2.8

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2006-08-25 17:37:50
56Cryptography / Computing / Transport Layer Security / Key management / Public-key cryptography / Hypertext Transfer Protocol / Computer network security / HTTPS / Man-in-the-middle attack / Browser security / Public key certificate / Public key infrastructure

Improving the Usability of Web Browser Security Haidong Xia and Jose´ Carlos Brustoloni Department of Computer Science, University of Pittsburgh {hdxia,jcb}@cs.pitt.edu ABSTRACT

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-06-21 09:58:18
57Computing / Network architecture / World Wide Web / Internet protocols / SPDY / HTTP/2 / CRIME / Play Framework / Push technology / QUIC / Hypertext Transfer Protocol / Application-Layer Protocol Negotiation

Is The Web HTTP/2 Yet? http://isthewebhttp2yet.com/ Matteo Varvello1 , Kyle Schomp2 , David Naylor3 , Jeremy Blackburn1 , Alessandro Finamore1 , and Konstantina Papagiannaki1 Telef´onica Research1 , Case Western Reserve

Add to Reading List

Source URL: www.tid.es

Language: English - Date: 2016-02-24 03:40:34
58Computing / Internet / Cryptography / Computer network security / Internet Standards / Directory services / Cryptographic protocols / Secure communication / Safe Software / Kerberos / Transport Layer Security / HTTPS

FME® Server Security Table of Contents FME Server Authentication - Access Control

Add to Reading List

Source URL: cdn.safe.com

Language: English - Date: 2015-07-30 16:36:24
59Computing / Network architecture / Internet / Cryptographic protocols / Secure communication / Transport Layer Security / Internet protocols / Internet Standards / HTTPS / Opportunistic TLS / Email client / Simple Mail Transfer Protocol

Proceedings on Privacy Enhancing Technologies 2016; ):1–18 Shuai Li* and Nicholas Hopper Mailet: Instant Social Networking under Censorship

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2016-06-28 22:06:37
60Computing / NetOps / Military communications / LandWarNet / Router / Interoperability

Router Element Manager The Router Element Manager configures and manages Open Systems Interconnection Layer-3 (Network) level routers (Army Distribution and Security/Perimeter Routers) for a specific vendor’s routers

Add to Reading List

Source URL: netcom.army.mil

Language: English - Date: 2009-10-26 18:28:24
UPDATE