Network protocols

Results: 10979



#Item
471Network performance / Internet protocols / Network architecture / TCP acceleration / WAN optimization / Transmission Control Protocol / Internet protocol suite / Communications protocol / Packeteer / Space Communications Protocol Specifications

Microsoft Word - TIB_Interop21052010.doc

Add to Reading List

Source URL: www.xiplink.com

Language: English - Date: 2010-12-14 17:29:00
472Internet protocols / Cryptography / Schengen Routing / Internet Standards / Computer network security / Internet privacy / Schengen Area / Internet / Border Gateway Protocol / Routing / European integration / IPsec

Secure communication and digital sovereignty in Europe Norbert Pohlmann . Michael Sparenberg . Illya Siromaschenko . Kilian Kilden Institute for Internet Security – if(is) Westfälische Hochschule, Gelsenkirchen

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-12-20 07:45:16
473Internet Protocol / Internet Standards / Telecommunications engineering / Network protocols / Network architecture / Virtual LAN / Computer network / Internet protocol suite / Network address translation / IP address / Quality of service / Network switch

SSVVP™ SIP School VVoIP Professional Certification Exam Objectives The SSVVP™ exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that you need

Add to Reading List

Source URL: www.thesipschool.com

Language: English - Date: 2015-03-14 20:13:16
474Cryptographic protocols / Internet protocols / IPsec / Tunneling protocols / Computer network security / Internet security / Internet Key Exchange / Internet layer / Internet Security Association and Key Management Protocol / Security service / Security Parameter Index / Layer 2 Tunneling Protocol

Network Working Group Request for Comments: 2401 Obsoletes: 1825 Category: Standards Track S. Kent

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2015-11-01 16:21:19
475Computer network security / Wireless networking / IEEE 802.11 / Wi-Fi / Cryptographic protocols / Wi-Fi Protected Access / Router / Wired Equivalent Privacy / Wardriving / Pharming / Computer security / Wireless router

WiFi networks and malware epidemiology Hao Hua,b, Steven Myersb, Vittoria Colizzac, and Alessandro Vespignanib,c,1 aDepartment of Physics, Indiana University, 727 East Third Street, Bloomington, IN 47405; bSchool of Info

Add to Reading List

Source URL: www.epicx-lab.com

Language: English - Date: 2012-09-08 12:43:38
476Network management / Internet Standards / Internet protocols / System administration / Computer systems / Syslog-ng / Syslog / Balabit / Logfile / Log management / Log analysis / Information technology security audit

syslog-ng Store Box PRODUCT DESCRIPTION CopyrightBalaBit IT Security All rights reserved.

Add to Reading List

Source URL: log-management.it

Language: English - Date: 2014-05-07 13:40:47
477Multimedia / Internet broadcasting / Network protocols / Digital television / Internet television / Streaming media / Transmission Control Protocol / LTE / Proxy server / YouTube / Flash Video / Hypertext Transfer Protocol

MSPlayer: Multi-Source and multi-Path LeverAged YoutubER Yung-Chih Chen UMass Amherst

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:57:08
478Ethernet / Network protocols / TRILL / Spanning Tree Protocol / MAC address / Network switch / Routing / Media access control / Unicast flood / Address Resolution Protocol

Microsoft Word - comd078-rojas.doc

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2011-08-01 22:53:06
479System administration / Internet Standards / Internet protocols / Network management / Syslog-ng / Syslog / Filesystem Hierarchy Standard / Esser / X86-64

PDF Document

Add to Reading List

Source URL: hm.hgesser.de

Language: English - Date: 2009-03-04 06:20:30
480Network protocols / Internet protocols / Internet Standards / IP multicast / Multicast / Tor / Overlay multicast / Mechanistic target of rapamycin / Traffic analysis / Internet Relay Chat / Reliability / Email

Proceedings on Privacy Enhancing Technologies ; ):22–39 Dong Lin, Micah Sherr, and Boon Thau Loo Scalable and Anonymous Group Communication with MTor Abstract: This paper presents MTor, a low-latency anonymous

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2016-07-26 12:57:18
UPDATE