Network layer

Results: 1811



#Item
671Security / Application firewall / Computer security / Akamai Technologies / Firewall / Denial-of-service attack / Computer network security / Computing / Cyberwarfare

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona Web Application Firewall Application- layer defense to protect against attacks like SQL injections and cross-site scripts Everyone connected to the enterprise – wor

Add to Reading List

Source URL: www.akamai.de

Language: English - Date: 2014-07-29 16:36:01
672OSI protocols / Network topology / IEEE 802 / Token ring / Integrated Services Digital Network / Ethernet / Business telephone system / Physical layer / PHY / Electronic engineering / Computing / IEEE standards

PDF Document

Add to Reading List

Source URL: www.psiber.com

Language: English - Date: 2009-12-18 20:17:19
673Tunneling protocols / Computer architecture / Ethernet / NetBSD / Virtual private networks / Customer-premises equipment / Jumbo frame / Layer 2 Tunneling Protocol / IPsec / Network architecture / Computing / Internet protocols

Developing CPE Routers based on NetBSD: Fifteen Years of SEIL Masanobu SAITOH([removed])∗ Hiroki SUENAGA([removed])†

Add to Reading List

Source URL: netbsd.org

Language: English - Date: 2014-12-19 06:10:40
674IEEE 802.1X / Password / PROFINET / Extensible Authentication Protocol / Link Layer Discovery Protocol / Technology / Computing / Computer network security

LanExpert 85 Revision History Version 2.02 This release removes the ERASE ALL MEMORY capability which made the unit not useable. Version 2.01 Internal Clean up of 2.00 version Version 2.00

Add to Reading List

Source URL: www.psiber.com

Language: English - Date: 2012-05-15 14:33:45
675Information / Teletraffic / Internet protocols / Transmission Control Protocol / Network congestion / Traffic generation model / Transport layer / Communications protocol / TCP congestion avoidance algorithm / Data / Network performance / Computing

Internet Engineering Task Force INTERNET-DRAFT Intended status: Informational Expires: August[removed]S. Floyd

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-02-23 18:30:49
676Technology / Ethernet physical layer / Wi-Fi / Wireless network / Internet access / Network architecture / 2Wire / Ethernet over twisted pair / Home network / Ethernet / Wireless networking / Computing

Having Trouble? Many issues can be resolved in three simple steps: 1. Check your connections. Verify that cables and cords on all devices are connected as specified in step 1. Cables usually make an audible click when s

Add to Reading List

Source URL: www.att.com

Language: English - Date: 2010-12-17 11:04:46
677Internet protocols / Network performance / Flow control / Transmission Control Protocol / TCP congestion avoidance algorithm / Transport layer / Internet protocol suite / Network congestion / Internet Protocol / Data / Computing / Information

February 2013 in our Catchment Australia Day was a bit of a shock, and we have had the occasional shower since. We are still not really getting anywhere near average rain, and the weather certainly hasn’t slowed down t

Add to Reading List

Source URL: www.molonglocatchment.com.au

Language: English
678Internet protocols / Network performance / Flow control / Transmission Control Protocol / TCP congestion avoidance algorithm / Transport layer / Internet protocol suite / Network congestion / Internet Protocol / Data / Computing / Information

Saratoga: scalable, speedy data delivery for sensor networks Lloyd Wood Research Fellow, Centre for Communication Systems Research at the University of Surrey, e-mail: [removed] Abstract A networking transport

Add to Reading List

Source URL: personal.ee.surrey.ac.uk

Language: English - Date: 2011-07-02 13:24:56
679Emulex / Hyper-V / Hypervisor / Virtual machine / VMware / Blade server / Overlay network / Virtual access layer / Temporal isolation among virtual machines / System software / Software / Computing

CONNECTIVITY - SOLUTIONS BRIEF Accelerate VMware Hybrid Cloud Workloads with HP and Emulex Unique Emulex offload technology delivers higher throughput, CPU effectiveness and power efficiency Emulex-HP advantages

Add to Reading List

Source URL: www.emulex.com

Language: English
680Security / Application firewall / Computer security / Akamai Technologies / Firewall / Denial-of-service attack / Computer network security / Computing / Cyberwarfare

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona Web Application Firewall Application- layer defense to protect against attacks like SQL injections and cross-site scripts Everyone connected to the enterprise – wor

Add to Reading List

Source URL: www.akamai.fr

Language: English - Date: 2014-07-29 16:36:01
UPDATE