Network security

Results: 23614



#Item
431Computing / Network architecture / Internet / Network protocols / Internet Standards / Internet protocols / Cryptographic protocols / Secure communication / Transport Layer Security / Transmission Control Protocol / Clientserver model / Session

Microsoft Word - IBSS&K Engineering.doc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-02-02 08:46:10
432Social Security / Ticket to Work / Unemployment in the United States / Acronym / Ticket

Finding the right Employment Network (EN) is an important step on your journey to financial independence! You are free to talk with as many ENs as you’d like before assigning your Ticket. Keep in mind, if you assign yo

Add to Reading List

Source URL: www.chooseworkttw.net

Language: English - Date: 2014-11-07 14:54:38
433International relations / International security / Military / International Peace Bureau / Nonviolence / Counterculture of the 1960s / NATO / Peace / Disarmament / International Network of Engineers and Scientists for Global Responsibility / Global Day of Action on Military Spending

The International Peace Bureau at the World Social Forum 2016 Image © Flickr, United Nations Photo Disarmament for Development

Add to Reading List

Source URL: ipb.org

Language: English - Date: 2016-08-02 08:37:42
434Safety / Prevention / Medicine / Identity documents / Health informatics / Computer network security / Bracelets / Fashion / Wristband / Medical identification tag / Medical alarm / Artificial cardiac pacemaker

Patients, Pacemakers, and Implantable Defibrillators: Human Values and Security for Wireless Implantable Medical Devices Tamara Denning† , Alan Borning† , Batya Friedman‡ , Brian T. Gill∗ , Tadayoshi Kohno† , a

Add to Reading List

Source URL: secure-medicine.org

Language: English - Date: 2016-03-07 16:20:00
435Computer security / Computer network security / Cyberwarfare / Security / Computer access control / Ambient intelligence / Internet of things / OWASP / Authentication / Cross-site scripting / Internet

Internet of ThingsTop Ten

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-08-17 12:09:42
436Government / Security / Cybercrime / Cyberwarfare / National security / Computer network security / Computer security / Cryptography / Cyber / United States Department of Homeland Security

I 114TH CONGRESS 2D SESSION H. R. 5064

Add to Reading List

Source URL: docs.house.gov

Language: English
437Food and drink / Agriculture / Climate change / Personal life / Agronomy / Anthropology / Drinks / Food industry / Pacific Island Farmers Organisation Network / Climate change and agriculture / Food security / Climate change adaptation

Policy Brief Agricultural Research and Farmer Organisations in the Pacific Summary Farmer Organisations (FOs), once a rarity in the Pacific, are emerging as key players in the agriculture sector, making valuable contribu

Add to Reading List

Source URL: www.pacificfarmers.com

Language: English - Date: 2016-03-22 21:07:28
438Computer security / Cyberwarfare / Computing / Computer network security / Software testing / Vulnerability / Hacking / Zero-day / Buffer overflow / Metasploit Project / Code injection / Social vulnerability

224 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 5,

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
439Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Data transmission / Handshaking / Network architecture / Authenticated encryption / Transport Layer Security

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer Christian Badertscher1, Christian Matt1, Ueli Maurer1, Phil Rogaway2, Björn Tackmann3 1ETH

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
440Security / Prevention / Computing / Crime prevention / Cryptography / Information governance / National security / Cyberwarfare / Computer security / Information security / Computer network / Vulnerability

Policy on Responsible and Ethical Use of Computing Resources Final version, approved by the CIT October 26, 1998 Revisions approved by the CIT November 4, 2002 Revisions approved by IT Executive Committee (ITEC) January

Add to Reading List

Source URL: infosec.wfu.edu

Language: English - Date: 2016-02-05 15:10:03
UPDATE