Network security

Results: 23614



#Item
301Internet privacy / Computing / Privacy / Cyberspace / Computer security / HTTP cookie / Personally identifiable information / Medical privacy / P3P / Network Advertising Initiative

Privacy Policy This privacy policy sets out how the A.D.F.P. uses and protects any information that you give the A.D.F.P. when you use this website. The A.D.F.P. is committed to ensuring that your privacy is protected. S

Add to Reading List

Source URL: www.adfp.co.uk

Language: English - Date: 2012-01-11 09:49:19
302Computing / Cryptography / Network architecture / Internet protocols / Cryptographic protocols / Secure communication / Hypertext Transfer Protocol / World Wide Web / Transport Layer Security / Secure Remote Password protocol / Communications protocol / HTTPS

PLACES’10 The 3rd Workshop on Programming Language Approaches to Concurrency and Communication-Centric Software

Add to Reading List

Source URL: places10.di.fc.ul.pt

Language: English - Date: 2010-12-07 19:00:11
303Security / Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / National security

SMART, SECURE NETWORKS OF CONNECTED PEOPLE SECURE INFORMATION SHARING Secure, scalable collaboration solutions developed especially for organisations with the most demanding security requirements.

Add to Reading List

Source URL: www.surevine.com

Language: English - Date: 2016-02-16 06:08:14
304Security / Cyberwarfare / Computer security / Computer network security / Cybercrime / E-commerce / Cryptography / National security / Online banking / Email / Identity theft / Malware

Microsoft Word - Sound Business PracticesBusinessesFinal042811

Add to Reading List

Source URL: www.nacha.org

Language: English
305Computing / Computer network security / Cyberwarfare / Computer security / Multi-agent systems / Spamming / Intrusion detection system / Malware / Computer virus / Botnet / Alert correlation / Infection

BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2007-06-29 16:14:13
306DMZ / Literature / Korean Demilitarized Zone / Fiction / International security

Q1. Introduction UC Davis Policyrequires that devices connected to the UC Davis electronic communication network must either meet UC Davis security standards or obtain an authorized exception to policy. Further,

Add to Reading List

Source URL: security.ucdavis.edu

Language: English - Date: 2015-10-30 12:37:02
307Computing / Cyberwarfare / Computer security / Computer network security / E-commerce / Secure communication / Web application security / Automated threat / OWASP / Vulnerability / Application security / Denial-of-service attack

............................................................... .............................................................. ............................................................... .............................

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-10-23 12:02:35
308Computer network security / Computing / Internet privacy / Network architecture / Crypto-anarchism / Computer security / Computer architecture / Virtual private networks

How to get access to Processing Servers Projects inside DAPA DAPA offer two solutions for processing data related to ongoing projects.  

Add to Reading List

Source URL: dapa.ciat.cgiar.org

Language: English - Date: 2015-02-20 09:23:24
309Computer network security / Computing / Computer security / Cyberwarfare / Layer 2 Tunneling Protocol / Ethernet / DMZ / Virtual private network / Network switch / Firewall / Light-emitting diode

CyberGuard SG User Manual CyberGuard 7984 South Welby Park Drive #101 Salt Lake City, Utah 84084

Add to Reading List

Source URL: go.mcafee.com

Language: English - Date: 2006-01-11 00:17:53
310Computer access control / Computer security / Security / Identity management / Cryptography / Cybercrime / Computer network security / Password / Internet privacy / Password manager / Password strength

FAB_OnlineBankingSecurityTips

Add to Reading List

Source URL: www.firstamb.net

Language: English - Date: 2015-10-14 13:11:43
UPDATE