Network layer

Results: 1811



#Item
691Denial-of-service attack / Computing / Contemporary history / Denial-of-service attacks / Prolexic Technologies / Computer network security

Prolexic Flow Based (PLXfbm) Layer 3 and 4 distributed denial of service (DDoS) attack monitoring and analysis

Add to Reading List

Source URL: www.prolexic.com

Language: English - Date: 2014-03-20 17:26:53
692Computer architecture / Virtual private network / Transport Layer Security / Extranet / Cisco Systems VPN Client / HTTP Secure / SSL-Explorer: Community Edition / Microsoft Forefront Unified Access Gateway / Computer network security / Computing / Computer security

Menlo Logic AccessPoint SSL VPN Menlo Logic An Introduction to SSL VPN

Add to Reading List

Source URL: www.menlologic.com

Language: English - Date: 2013-03-23 17:41:41
693OSI protocols / Internet standards / Internet Protocol / Internetworking / TCP/IP model / Communications protocol / Internet protocol suite / Computer network / Data link layer / Computing / Network architecture / Computer architecture

Microsoft Word - ISOM3180_syllabus_Spring1415

Add to Reading List

Source URL: www.bm.ust.hk

Language: English - Date: 2015-03-04 18:04:16
694Real Time Streaming Protocol / Transmission Control Protocol / Multicast / Application layer / Streaming / Internet protocols / Network protocols / Real-time Transport Protocol / Network architecture / OSI protocols / Computing

The RTSP Core specification draft-ietf-mmusic-rfc2326bis-06.txt Magnus Westerlund Aravind Narasimhan Rob Lanphier Anup Rao

Add to Reading List

Source URL: www.dmn.tzi.org

Language: English - Date: 2004-07-26 12:23:18
695J1939 / Data / CAN bus / OSI model / Communications protocol / RV-C / Computer buses / Technology / Computing

J1939 Protocol The SAE J1939 set of profiles is based on the Controller Area Network (CAN) data link layer (ISO[removed]using the extended frame format (29-bit identifiers). Several documents have undergone revision aft

Add to Reading List

Source URL: www.simmasoftware.com

Language: English - Date: 2011-06-06 22:50:03
696CCSDS / Committees / Consultative Committee for Space Data Systems / Internet protocols / Network protocols / InterPlaNet / Communications protocol / File Transfer Protocol / Application layer / Computing / Data / Information

Report Concerning Space Data System Standards CCSDS FILE DELIVERY PROTOCOL (CFDP)— PART 3

Add to Reading List

Source URL: public.ccsds.org

Language: English - Date: 2007-10-02 13:41:37
697HTTP / Cryptographic protocols / Secure communication / Electronic commerce / Network protocols / Transport Layer Security / Session / HTTP Secure / HTTP cookie / Computing / Internet / Cryptography

GlassTube A Lightweight Approach to Web Application Integrity Per A. Hallgren Daniel T. Mauritzson

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2013-04-29 05:47:46
698Internet standards / Computing / Cryptographic software / Internet / Network architecture / Transport Layer Security / Cipher suite / FTPS / Secure communication / Internet protocols / Cryptographic protocols

Microsoft Word - SSL Data Sheet.doc

Add to Reading List

Source URL: www.cmx.com

Language: English - Date: 2010-03-04 13:28:12
699Internet protocols / Internet standards / FTP clients / FTP / Cryptographic protocols / File Transfer Protocol / Bookmark / Secure FTP / Transport Layer Security / Computing / Internet / Network architecture

SimpleFTP User’s Guide On-Core Software, LLC. 893 Sycamore Ave. Tinton Falls, NJ 07724

Add to Reading List

Source URL: www.on-core.com

Language: English - Date: 2014-02-05 23:23:44
700Network architecture / Medium dependent interface / Ethernet over twisted pair / Power over Ethernet / Gigabit Ethernet / Electrical connector / Ethernet physical layer / Modular connector / Ethernet / OSI protocols / Computing

Comtrol-SATYRN U080-GN_front

Add to Reading List

Source URL: store.express-inc.com

Language: English - Date: 2013-02-05 15:43:01
UPDATE