Network security

Results: 23614



#Item
231Computing / Network performance / Computer network security / Network management / Cyberwarfare / Multi-agent systems / Spamming / Botnet / Transmission Control Protocol / Traffic classification / Denial-of-service attack / Measuring network throughput

C:/Users/beck/Desktop/CSET CONFERENCE 2010/USENIX template/4_11_DRAFT2/jayaram_drmiller changes/FINAL_SUBMISSION_AFTER REVIEW/CSET_submission.dvi

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-07-08 13:42:23
232Security / Prevention / Crime prevention / National security / Computer network security / Computer security / Cryptography / Cyberwarfare / Classified information

Position Designation Questionnaire

Add to Reading List

Source URL: www2.usgs.gov

Language: English - Date: 2016-05-25 09:18:36
233National Communications System / United States Department of Homeland Security / Research Development / ACN / Program management / Science and technology

ARCC coordination network: Annual report

Add to Reading List

Source URL: www.arcc-network.org.uk

Language: English - Date: 2015-08-28 12:26:02
234Software / Computer security / System software / Antivirus software / Computer virus / Malware / Zero-day / Intrusion detection system / Clam AntiVirus / Bitdefender / Mobile security / Avira

CloudAV: N-Version Antivirus in the Network Cloud Jon Oberheide, Evan Cooke, Farnam Jahanian Electrical Engineering and Computer Science Department University of Michigan, Ann Arbor, MI 48109 {jonojono, emcooke, farnam}@

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-11 18:23:54
235Computing / Internet / Domain name system / Network architecture / Internet protocols / Internet Standards / Domain Name System Security Extensions / Google Public DNS / Name server / DNSCrypt / Transmission Control Protocol / DNSCurve

2015 IEEE Symposium on Security and Privacy Connection-Oriented DNS to Improve Privacy and Security Liang Zhu∗ , Zi Hu∗ , John Heidemann∗ , Duane Wessels† , Allison Mankin† , Nikita Somaiya∗ ∗ USC/Informat

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:06
236Security / Cyberwarfare / Computing / Computer security / Computer network security / Cybercrime / National security / Threat / Malware / Security hacker / Cyber-Insurance

training.keywcorp.com This two-day course introduces managers to the processes, techniques, and terminology used by cyber professionals to explain, discover, and prevent threats to enterprise networks and sensitive busi

Add to Reading List

Source URL: training.keywcorp.com

Language: English - Date: 2016-06-28 22:20:29
237Anime / Computing / Internet privacy / Fiction / Computer networking / Computer network security / Proxy list / Ergo Proxy / Proxy server

Instructors Guide Lesson Template

Add to Reading List

Source URL: oit.siu.edu

Language: English - Date: 2016-05-18 11:50:46
238Geological surveys / Geology of the United States / Reston /  Virginia / Exploration of North America / San Mateo County /  California / United States Geological Survey / Government / Earth / Geography / Water quality / United States Department of Homeland Security

States & Tribes Supporting USGS National Stream Monitoring Network The Honorable Sally Jewell, Secretary of the Interior U.S. Department of the Interior 1849 C Street, NW Washington, D.C

Add to Reading List

Source URL: www.icwp.org

Language: English - Date: 2015-10-12 16:54:22
239Natural environment / Water / Biology / Environmentalism / Hydrology / Climate change mitigation / Climate resilience / Environmental issues with agriculture / Environmental justice / Drainage basin / Sustainability / Resilience

IWA World Water Congress & ExhibitionOctober 2016 • Brisbane • Queensland • Australia Basin Leaders Forum Building Water Security, Climate Resilience & Sustainable Management across Basins Wednesday 12 Octob

Add to Reading List

Source URL: www.iwa-network.org

Language: English
240Computing / Security / Crime prevention / Cryptography / Information governance / National security / Computer network security / Computer security / Email / System administrator

MONTANA BOARD OF REGENTS OF HIGHER EDUCATION Policy and Procedures Manual SUBJECT: INFORMATION TECHNOLOGY Policy – User Responsibilities – Patrons Adopted: May 24, 2002 ________________________________________

Add to Reading List

Source URL: mus.edu

Language: English - Date: 2015-09-01 14:10:20
UPDATE