Network security

Results: 23614



#Item
241Domain name system / Internet / Computing / Network architecture / Root name server / Name server / Domain name / DNS hosting service / Domain Name System Security Extensions / DNS zone

DNS data collection and analysis Kazunori Fujiwara, JPRS <> Copyright © 2015 Japan Registry Services Co., Ltd.

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2015-10-30 06:39:46
242Political corruption / Business ethics / Applied ethics / Corruption / Economy / Bribery / Corporate crime / International Anti-Bribery Act / Bribery Act

Ethics and Anti-bribery Policy - Corero Network Security plc_Sept 2013

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2014-01-24 16:11:31
243Computer security / Computer network security / Security / Cyberwarfare / Computer network operations / Campaign for Nuclear Disarmament / Threat / Intrusion detection system

Technology Service Corporation an employee-owned company 1983 S. Liberty Drive, Bloomington, INPhone: (

Add to Reading List

Source URL: www.tsc.com

Language: English - Date: 2015-08-27 14:40:43
244Computing / Software / Free software / Dark web / Internet privacy / Computer networking / Computer network security / Internet protocols / Tor / Proxy server / I2P / Internet Relay Chat flood

tissec-latency-leak-final.dvi

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:41
245Computing / Network architecture / Cryptographic protocols / Computer network security / Cryptography / Tunneling protocols / Virtual private networks / Internet protocols / IPsec / Internet Key Exchange / Layer 2 Tunneling Protocol / NAT traversal

Secure Business Connectivity HOBLink VPN 2.1 Gateway The VPN Solution for More Security and Greater Flexibility Edition 10|13

Add to Reading List

Source URL: www.hobsoft.com

Language: English - Date: 2014-01-10 07:06:54
246Malware / Computing / Computer network security / Multi-agent systems / Spamming / Cyberwarfare / Computer security / Malware analysis / Botnet

Impeding Automated Malware Analysis Paul Royal College of Computing Georgia Institute of Technology

Add to Reading List

Source URL: countermeasure2012.com

Language: English - Date: 2012-11-01 08:16:33
247Security / Geography of Alabama / Decatur /  Georgia / Decatur /  Alabama / Computer network / Decatur /  Illinois / Computer security / Service / Computing

Terms and Services for Proposal Decatur County is requesting a proposal for a contract that provides technology services, computer services, and maintenance of the Decatur County computer network and system (hereafter ca

Add to Reading List

Source URL: www.decaturcounty.in.gov

Language: English - Date: 2011-09-30 14:51:04
248Wireless networking / Cryptography / Technology / Computing / Vehicular ad hoc network / Wireless ad hoc network / Key distribution / Vehicular communication systems / Public-key cryptography / Key management / Vehicle-to-vehicle / Man-in-the-middle attack

GlobecomCommunication and Information System Security Symposium Probabilistic Key Distribution in Vehicular Networks with Infrastructure Support Jo˜ao Almeida∗ , Saurabh Shintre∗† , Mate Boban∗† , and

Add to Reading List

Source URL: mateboban.net

Language: English - Date: 2013-07-15 15:54:45
249Cyberwarfare / Computer security / Computing / Malware / Computer network security / Multi-agent systems / Spamming / Malware analysis / Antivirus software / Computer virus / Rootkit / Botnet

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:17:19
250MexicoUnited States border / Radio-frequency identification / Secure Electronic Network for Travelers Rapid Inspection / Identity documents / Immigration to the United States / ZIP Code / Address / Permanent residence / International relations / Business / Government

DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection SENTRI Application Approved OMB No

Add to Reading List

Source URL: ilw.com

Language: English - Date: 2012-09-10 14:49:33
UPDATE