Network layer

Results: 1811



#Item
871Internet privacy / Network architecture / Computer architecture / Virtual private networks / Layer 2 Tunneling Protocol / Point-to-Point Tunneling Protocol / VoIP VPN / Shiva Smart Tunneling / Computing / Tunneling protocols / Computer network security

Configure a VPN with XP VPN Overview A VPN is a private network created over a public one. It’s done with encryption, this way, your data is encapsulated and secure in transit – this creates the ‘virtual’ tunnel

Add to Reading List

Source URL: www.bzu.edu.pk

Language: English - Date: 2015-03-14 00:33:56
872Internet protocols / Packet loss / Packet switching / Transmission Control Protocol / Communications protocol / Transport layer / Y.156sam / ITU-T Y.1564 / Computing / Network architecture / Data

Internet Engineering Task Force (IETF) Request for Comments: 7497 Category: Informational ISSN: A. Morton

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2015-04-06 16:44:13
873Tunneling protocols / Computer architecture / Ethernet / NetBSD / Virtual private networks / Customer-premises equipment / Jumbo frame / Layer 2 Tunneling Protocol / IPsec / Network architecture / Computing / Internet protocols

Developing CPE Routers based on NetBSD: Fifteen Years of SEIL Masanobu SAITOH()∗ Hiroki SUENAGA()†

Add to Reading List

Source URL: www.netbsd.org

Language: English - Date: 2014-12-19 06:10:40
874Network protocols / Computer networking / Physical layer / Data link layer / Communications protocol / Virtual network / Virtual Interface / OpenFlow / Data / Computing / Information

Understanding OpenDaylight VTN and VTN Redirection Function Router-less routing of Traffic between hosts Shreyansh Jain 26/Feb/2015

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2015-02-26 10:57:23
875Ethernet / Network switch / Ethernet hub

Registration Form of Layer-2 Network Device for Co-location Customers

Add to Reading List

Source URL: www.iadvantage.net

Language: English - Date: 2015-02-03 23:12:06
876100 Gigabit Ethernet / Gigabit Ethernet / IEEE 802.3ba / IEEE 802.3 / Carrier Ethernet / Ethernet physical layer / Ethernet / OSI protocols / Network architecture

Ethernet Roadmap-2sides Final-11Mar

Add to Reading List

Source URL: www.ethernetalliance.org

Language: English - Date: 2015-03-23 14:51:00
877Cryptographic software / Internet / Internet privacy / Internet standards / Deep packet inspection / Network security / Transport Layer Security / Wireless security / Load balancing / Computing / Computer network security / Cryptography

Security and Privacy on the Encrypted Network 
 Version 1.5

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2015-02-04 12:16:03
878Cyberwarfare / Computer security / Computer network security / Transport Layer Security / Vulnerability / Palo Alto /  California / Social vulnerability / OpenSSL / Security / Electronic commerce / Secure communication

PALO ALTO NETWORKS PROVIDES ENTERPRISE CUSTOMERS PROTECTION FROM HEARTBLEED VULNERABILITY Palo Alto Networks Santa Clara Santa Clara, Calif., April 11, 2014 – Palo Alto Networks® (NYSE: PANW), the leader in enterprise

Add to Reading List

Source URL: www.infosecurityproject.com

Language: English - Date: 2015-02-04 04:23:42
879GrammaTech / Denial-of-service attacks / Wireshark / Computer network security / Pointer / C / Buffer overflow / Type I and type II errors / Transport Layer Security / Computing / Software / Software bugs

Bugs that Matter: True Positives and False Negatives in CodeSonar ® SATE 2010 Presented by: Paul Anderson, VP of Engineering, GrammaTech Inc.

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2013-05-07 16:54:58
880Cyberwarfare / Data security / Crime prevention / National security / Threat / Vulnerability / Information security / Backup / Transport Layer Security / Security / Computer network security / Computer security

COMP 2410 – Networked Information Systems SC1 – Security of Information and I.T. Roger Clarke Xamax Consultancy, Canberra Visiting Professor, A.N.U. and U.N.S.W.

Add to Reading List

Source URL: www.rogerclarke.com

Language: English - Date: 2015-02-18 23:27:02
UPDATE