Network layer

Results: 1811



#Item
851Electronic commerce / Internet protocols / Internet standards / Secure communication / Public-key cryptography / McAfee / Firefox / Transport Layer Security / Network Security Services / Software / Computing / Cryptography

Solution Brief Counterattacking BERserk Restoring the “trust” in trusted connectivity.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-12-05 18:25:15
852Gigabit Ethernet / IEEE 802.3 / Ethernet over twisted pair / Fast Ethernet / Network interface controller / Autonegotiation / Ethernet physical layer / Ethernet / OSI protocols / Network architecture

Asound Realtek A-8110S[removed]1000Mb Gigabit LAN Card FEATURES ? Adheres to IEEE 802.3, 802.3u, and 802.3ab standards

Add to Reading List

Source URL: www.orpheuscomputing.com

Language: English - Date: 2009-08-13 01:26:49
853Computer network security / Directory services / Internet protocols / Internet standards / Cryptographic protocols / MongoDB / Lightweight Directory Access Protocol / Kerberos / Transport Layer Security / Computing / Data / Information

MongoDB databases at risk – Several thousand MongoDBs without access control on the Internet Jens Heyens, Kai Greshake, Eric Petryka January 2015

Add to Reading List

Source URL: cispa.saarland

Language: English - Date: 2015-03-09 04:26:59
854Denial-of-service attack / Computing / Contemporary history / Denial-of-service attacks / Prolexic Technologies / Computer network security

Prolexic Flow Based (PLXfbm) Layer 3 and 4 distributed denial of service (DDoS) attack monitoring and analysis

Add to Reading List

Source URL: www.prolexic.com

Language: English - Date: 2014-03-20 17:10:02
855Information / TCP/IP / Flow control / Internet protocols / TCP congestion avoidance algorithm / Data transmission / Transmission Control Protocol / Packet loss / Transport layer / Network performance / Computing / Data

JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 7, NO. 3, SEPTEMBER[removed]Enhancing TCP Performance to Persistent Packet Reordering

Add to Reading List

Source URL: www.eee.hku.hk

Language: English - Date: 2005-10-28 01:50:12
856Network architecture / Networking hardware / Computer networking / Internet protocols / TCP offload engine / Link layer / Data link layer / OSI model / Ethernet / Computing / Data / OSI protocols

Acromag, Incorporated[removed]S Wixom Rd, PO Box 437, Wixom, MI[removed]USA Tel: [removed] • Fax: [removed] • www.acromag.com White Paper: Ethernet in the Embedded Space

Add to Reading List

Source URL: www.aventasinc.com

Language: English - Date: 2013-05-31 07:57:38
857Internet protocols / Secure communication / Session Initiation Protocol / Media Gateway Control Protocol / VoIP phone / Media Gateway Controller / Network address translation / Media gateway / Transport Layer Security / Voice over IP / Videotelephony / Internet standards

VOICE OVER IP SECURITY February 2008 © The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2009-06-15 09:06:19
858Internet protocols / Cryptographic protocols / Data / Computer network security / Technical terminology / Extensible Threat Management / FIPS 140 / HMAC / Transport Layer Security / Computing / Cryptography / Cryptography standards

FIPS[removed]Security Policy for WatchGuard XTM XTM 850, XTM 860, XTM 870, XTM 870-F XTM 1520, XTM 1525

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-02 15:05:01
859Network protocols / Telecommunications / Electronic engineering / Multiplexing / Network theory / Theoretical computer science / Optical burst switching / Routing / Wavelength-division multiplexing / Routing and wavelength assignment / Network architecture / Fiber-optic communications

1 Cross-Layer Adaptive Routing and Wavelength Assignment in All-Optical Networks Yvan Pointurier, Ma¨ıt´e Brandt-Pearce, Suresh Subramaniam and Bo Xu

Add to Reading List

Source URL: www.pointurier.org

Language: English - Date: 2008-05-28 13:02:32
860Electronic commerce / Internet protocols / Internet standards / Secure communication / Public-key cryptography / McAfee / Firefox / Transport Layer Security / Network Security Services / Software / Computing / Cryptography

Solution Brief Counterattacking BERserk Restoring the “trust” in trusted connectivity.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-12-05 18:25:15
UPDATE