Network security

Results: 23614



#Item
421Computing / Security / Information technology management / Computer network security / Computer security / Crime prevention / Cryptography / National security / Information security / Security appliance / Intrusion detection system / Firewall

Job Opening April 19, 2016 JOB TITLE: DEPT: System Security Administrator

Add to Reading List

Source URL: esd.ny.gov

Language: English - Date: 2016-04-19 12:12:44
422Spamming / Computing / Cyberspace / Social engineering / Spam filtering / Cybercrime / Computer security / Computer network security / Cloudmark / Phishing / Email spam / Anti-spam techniques

Intelligent Spear Phishing Protection: Stopping Highly Targeted Attacks Spear phishing is one of the top threats plaguing enterprises today, often resulting in severe financial losses and theft of intellectual property.

Add to Reading List

Source URL: www.cloudmark.com

Language: English - Date: 2016-01-11 19:00:03
423Education / Educational psychology / Learning / Crime prevention / Exercise / Mathematics education / Educational technology / Active learning / Testbed / Computer security

Teaching Security With Network Testbeds Jelena Mirkovic, Mike Ryan and John Hickey (USC/ISI) Keith Sklower (UC Berkeley) Peter Reiher and Peter A. H. Peterson (UC Los Angeles) B. Hoon Kang (George Mason University) Mooi

Add to Reading List

Source URL: edusigcomm.info.ucl.ac.be

Language: English - Date: 2011-03-11 22:12:23
424Information technology management / Computing / Computer security / Data mining / Data security / Information technology / Anomaly detection / Data analysis / Intrusion detection system / Network monitoring / Anomaly / Server

Anomaly detection from server log data. A case study

Add to Reading List

Source URL: www.vtt.fi

Language: English - Date: 2015-03-18 09:57:49
425Computing / Cyberwarfare / Computer security / Computer network security / SQL / Hacking / Software testing / Web applications / SQL injection / Vulnerability / Web application security / Code injection

Achieving Web Security by Increasing the Web Application Safety Maryam Abedi Navid Nikmehr Mohsen Doroodchi

Add to Reading List

Source URL: worldcomp-proceedings.com

Language: English - Date: 2014-05-28 12:08:56
426Computer network security / Security / Computing / Cyberwarfare / Computer security / Crime prevention / Cryptography / National security / Intrusion detection system / Software-defined protection / Wireless security

Parapet_Service_Overview_20020522.doc

Add to Reading List

Source URL: www.ventajamarketing.com

Language: English - Date: 2008-12-09 00:36:52
427Computing / Internet / Password / Security / File hosting service / File Transfer Protocol / Network architecture

LRMP DOWNLOAD SERVICE User Guide, Data Descriptions, Order Form and Licence Agreement GMC LRMP Download Service User Guide (Version 2.4)

Add to Reading List

Source URL: www.gmc-uk.org

Language: English - Date: 2016-08-18 04:47:31
428Computer security / Security / Cryptography / Trusted computing / Data security / Computer network security / Trusted Computer System Evaluation Criteria / Trusted system / Guard / Trusted computing base / Common Criteria / Blacker

COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. Schell

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:30
429Wireless networking / Wireless / Synthetic aperture radar / Sensors / Technology / Computing / Computer networking / Sensor node / Wireless sensor network / Unattended ground sensor / Security alarm

iScout® i S co u t ® D E S I G N iScout® sensors were designed to produce exceptional performance while keeping size and cost

Add to Reading List

Source URL: www.mcqinc.com

Language: English - Date: 2015-11-23 09:29:36
430Security / Computer security / Crime prevention / Cryptography / Information governance / National security / Computer network security / Vulnerability / Authorization / Computing

MONTANA BOARD OF REGENTS OF HIGHER EDUCATION Policy and Procedures Manual SUBJECT: INFORMATION TECHNOLOGY Policy – User Responsibilities – Employees Adopted: May 24, 2002 ______________________________________

Add to Reading List

Source URL: mus.edu

Language: English - Date: 2015-08-31 13:56:00
UPDATE