Network security

Results: 23614



#Item
461Security / Computing / Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / National security / Parser Grammar Engine / WECC / Pilot

Microsoft PowerPoint03_24 PGE 2016 WECC Low Impact Generation Pilot Project REV.3 Final

Add to Reading List

Source URL: www.wecc.biz

Language: English - Date: 2016-05-26 11:12:43
462Security / Cyberwarfare / Computer security / Cryptography / Computer network security / Cybercrime / Malware / Internet privacy / Antivirus software / CrySyS Lab

Int. Secure Systems Lab Vienna University of Technology Identifying Dormant Functionality in Malware Programs Paolo Milani Comparetti

Add to Reading List

Source URL: oakland31.cs.virginia.edu

Language: English - Date: 2010-05-26 16:17:45
463Computer security / Security / Computer access control / Cyberwarfare / Identity theft / Cybercrime / Computer network security / Rogue software / Spyware / Password / Multi-factor authentication / Phishing

Tips on Online Security Security Practices to Safeguard Your Password You are advised to adopt the following: • • •

Add to Reading List

Source URL: secure.ifastnetwork.com

Language: English - Date: 2014-09-25 22:08:54
464Computing / Network architecture / Internet / File Transfer Protocol / Operating system / Simple Mail Transfer Protocol / Accelerometer / Alarms / Security alarm

Microsoft Word - OASIS_System_Overview

Add to Reading List

Source URL: www.kmioss.com

Language: English - Date: 2016-08-04 11:38:27
465Safety / Prevention / European Union / Security / Disaster preparedness / Humanitarian aid / Occupational safety and health / European Network of Transmission System Operators for Electricity / Emergency management / Smart grid / Energy policy of the European Union / Preparedness

European Distribution System Operators for Smart Grids Response to the European Commission’s public consultation on risk preparedness in the area of security of electricity supply

Add to Reading List

Source URL: www.edsoforsmartgrids.eu

Language: English - Date: 2015-10-05 06:13:16
466Computing / Denial-of-service attacks / Cyberwarfare / Business / Internet Relay Chat / Technology / Denial-of-service attack / Content delivery network / Prolexic Technologies / Fortinet / Akamai Technologies / Sourcefire

Corero Network Security plc Results for the year ended 31 December 2013 Ashley Stephenson, CEO Andrew Miller, CFO and COO

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2014-07-15 12:06:30
467Computing / Computer network security / Computer security / Software / Computer access control / Directory services / RADIUS / NetIQ eDirectory / TACACS / Integrated Windows Authentication / Comparison of mail servers

RadiusNT & RadiusX The Ultimate RADIUS Servers For Windows NT, Linux, Solaris & Cobalt Appliances Version 4.0

Add to Reading List

Source URL: www.iea-software.com

Language: English - Date: 2006-11-25 04:29:55
468Health / Prevention / Public health / Crime prevention / Law enforcement / National security / Security / Developmental biology / Neural tube defect / Surveillance / Folic acid / Centers for Disease Control and Prevention

NBDPN is a network of individuals working at the national, state and local level in birth defects surveillance, research, and prevention. It serves as a forum for exchanging ideas about the prevention of birth defects, d

Add to Reading List

Source URL: www.nbdpn.org

Language: English - Date: 2010-08-10 09:08:48
469Computer access control / Computer security / Computing / Computer network security / Federated identity / Wireless networking / Internet protocols / Authentication / IEEE 802.1X / RADIUS / Single sign-on / Mutual authentication

Secure Authentication System for Public WLAN Roaming ‡ Yasuhiko Matsunaga †

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-05-10 19:56:51
470Computer security / Security / Computer access control / Computer network security / Access control / Identity management / Cryptography / Authentication / Password / Trusted computing base / User / Multilevel security

Computer Security in the Real World Butler W. Lampson1 Microsoft Abstract After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason i

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2000-11-10 16:38:10
UPDATE