Network layer

Results: 1811



#Item
741Computer network security / Email authentication / Crime prevention / National security / Information security / Malware / Network security / S/MIME / Email encryption / Computing / Computer security / Security

Security and Compliance Office 365 Introduction .................................. 3 Service-Level Security ................ 3 Physical layer—facility and network security[removed]

Add to Reading List

Source URL: gallery.mailchimp.com

Language: English - Date: 2014-08-22 03:13:04
742Cryptographic protocols / Computing / Data / Virtual private networks / IPsec / Layer 2 Tunneling Protocol / Internet Key Exchange / Internet protocols / Tunneling protocols / Network architecture

Microsoft PowerPoint - 63-mmusic-sdp-ipsec-negotiation-req

Add to Reading List

Source URL: www.dmn.tzi.org

Language: English - Date: 2005-08-01 05:02:15
743Denial-of-service attacks / Computer security / Denial-of-service attack / Internet Relay Chat / Internet / Transport Layer Security / Sockstress / Intrusion prevention system / Prolexic Technologies / Computer network security / Computing / Cyberwarfare

DDoS MITIGATION SERVICES DDoS MITIGATION SERVICES WE LIVE AND BREATHE INFRASTRUCTURE SO YOU DON’T HAVE TO. IT’S OUR PASSION. IT’S OUR LIFE’S WORK.

Add to Reading List

Source URL: cdn.servercentral.com

Language: English - Date: 2015-03-04 20:00:03
744Physical oceanography / Argo / Fisheries science / Adriatic Sea / Network On Chip / Southampton / Local government in England / Oceanography / Hampshire

Effects of very harsh 2012 winter conditions on the deep layer of the Southern Adriatic Sea Bensi M.*1, Cardin V.1, Rubino A.2, Notarstefano G.1, Poulain P.M.1 1 Istituto

Add to Reading List

Source URL: www.euro-argo.eu

Language: English
745OSI protocols / Internet protocols / Network architecture / Fire alarm system / Internet protocol suite / Communications protocol / OSI model / Virtual private network / Transport layer / Computing / Data / Information

March 2014 Version 1.5 Automatic Fire Alarm Service Provider Computer Interface Specification For the New Zealand Fire Service

Add to Reading List

Source URL: www.fire.org.nz

Language: English - Date: 2014-12-14 21:48:52
746Computing / Network interface device / Structured cabling / IiNet / Internode / Ethernet physical layer / Access network / Burglar alarm / Ethernet over twisted pair / Local loop / Electronic engineering / OSI protocols

NBN Stage 1 Service Description

Add to Reading List

Source URL: www.internode.on.net

Language: English - Date: 2014-09-30 20:39:56
747Electronic commerce / Internet protocols / Internet standards / Secure communication / Public-key cryptography / McAfee / Firefox / Transport Layer Security / Network Security Services / Software / Computing / Cryptography

Solution Brief Counterattacking BERserk Restoring the “trust” in trusted connectivity.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-12-05 18:25:15
748Internet / Spam filtering / Computer network security / Spamming / Internet privacy / Barracuda Networks / Transport Layer Security / Anti-spam techniques / Jumbleme / Computing / Email / Computer-mediated communication

Securing Email with Email Encryption Whitepaper Barracuda Networks Securing Email with Email Encryption

Add to Reading List

Source URL: www.barracuda.com

Language: English - Date: 2014-07-09 12:03:25
749Kriging / Multivariate interpolation / Erlang / Estimation theory / Physical layer / Routing and wavelength assignment / Statistics / Geostatistics / Interpolation

Lightpath establishment in distributed transparent dynamic optical networks using network kriging Nicola Sambo(1) , Yvan Pointurier(2) , Filippo Cugini(3) , Luca Valcarenghi(1) , Piero Castoldi(1) , Ioannis Tomkos(2) (1)

Add to Reading List

Source URL: www.pointurier.org

Language: English - Date: 2009-06-13 11:35:59
750Data / Transmission Control Protocol / Slow-start / Transport layer / Goodput / Packet loss / Network congestion / TCP congestion avoidance algorithm / Throughput / Network performance / Computing / Network architecture

Wireless Netw[removed]:1577–1593 DOI[removed]s11276[removed]A packet-reordering solution to wireless losses in transmission control protocol Ka-Cheong Leung • Chengdi Lai • Victor O. K. Li

Add to Reading List

Source URL: www.eee.hku.hk

Language: English - Date: 2013-09-05 11:00:00
UPDATE