Network security

Results: 23614



#Item
201Security / Data management / Computing / Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Data / Computer emergency response team / Search engine indexing

Data Mining in Incident Response Challenges and Opportunities Alexandre Dulaunoy TLP:WHITE Information Security Education

Add to Reading List

Source URL: www.circl.lu

Language: English - Date: 2016-08-11 10:49:35
202Computing / Security / Computer network security / Cybercrime / Data security / Computer security / Cryptography / Secure communication / Cloud computing / Multi-factor authentication / De-perimeterisation

Two Factor Authentication: Security in an Age of Zero Trust Jon Oberheide, CTO, Duo Security Not-so-surprising trends  Cloud

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-18 22:20:40
203Computer security / Cyberwarfare / Security / Computer network security / Hacking / Cybercrime / Advanced persistent threat / Espionage / Trend Micro / Zero-day / Targeted threat / Internet security

Detecting the Enemy Inside the Network: How tough is it to Deal with APTs?

Add to Reading List

Source URL: about-threats.trendmicro.com

Language: English - Date: 2013-04-19 02:52:06
204Computing / Network architecture / Internet / Smart cards / Internet protocols / Internet Standards / Cryptographic protocols / Network protocols / Subscriber identity module / Universal Integrated Circuit Card / Transport Layer Security / Hypertext Transfer Protocol

SCWS_SteppingStones_2009_v1.0.0

Add to Reading List

Source URL: simalliance.org

Language: English - Date: 2015-03-26 18:46:30
205Computing / Security / Secure communication / Cyberwarfare / Computer security / Information privacy / Human rights / Data protection / Internet privacy / Privacy / Data mining / Internet security

Large-Scale Collection and Sanitization of Network Security Data: Risks and Challenges∗ (position paper) Phillip Porras Vitaly Shmatikov

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2006-07-31 13:42:23
206Computing / Computer security / Software engineering / Computer network security / Cyberwarfare / Data security / Firewall / Network management / Trusted Information Systems / APL / Guard / Malware

Frederick M. AvolioFrederick Road Woodbine, MD5215 (mh)

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2010-05-14 09:24:10
207Computing / Network management / Information technology management / Computer network security / Local area networks / Virtual LAN / Load balancing / Ixia / Firewall / Data monitoring switch / Net Optics

DATA SHEET IXIA XSTREAM 10 TM AGGREGATION, FILTERING, AND

Add to Reading List

Source URL: www.ixiacom.com

Language: English - Date: 2016-07-25 19:36:58
208Security / Cybercrime / National security / Prevention / Cyberwarfare / Computer network security / Computer security / Cryptography

DEPARTMENT OF CIVILIAN PERSONNEL MANAGEMENT SERVICE 1400 KEY BOULEVARD ARLINGTON, VA 22209·

Add to Reading List

Source URL: cpol.army.mil

Language: English - Date: 2016-07-05 14:56:37
209Cybercrime / Security / Computing / Cyberwarfare / Computer network security / Spamming / Chess strategy / Phishing / SHA-1 / Email / Pawn / Computer security

A Trend Micro Research Paper Operation Pawn Storm Using Decoys to Evade Detection Loucif Kharouni

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2014-10-26 23:30:05
210Computing / Internet protocols / Network architecture / World Wide Web / SPDY / HTTP/2 / QUIC / Multipath TCP / LTE / Transmission Control Protocol / Hypertext Transfer Protocol / Transport Layer Security

An Anatomy of Mobile Web Performance over Multipath TCP Bo Han Feng Qian∗ Shuai Hao Lusheng Ji

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-12-02 16:47:09
UPDATE