Network security

Results: 23614



#Item
501Computing / NetOps / Military communications / LandWarNet / Router / Interoperability

Router Element Manager The Router Element Manager configures and manages Open Systems Interconnection Layer-3 (Network) level routers (Army Distribution and Security/Perimeter Routers) for a specific vendor’s routers

Add to Reading List

Source URL: netcom.army.mil

Language: English - Date: 2009-10-26 18:28:24
502Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Certificate policy / Certificate authority / Revocation list / Public key certificate / X.509 / Authentication / Energy Sciences Network

DOE Grids Certificate Policy And Certification Practice Statement Version 2.9

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2006-12-15 16:35:48
503Emerging technologies / Computing / Network architecture / Cloud infrastructure / Cloud computing / Technology / Internet of things / Network function virtualization / Software-defined networking / 9 / Cloud computing issues

NETEVENTS APAC PRESS & SERVICE PROVIDER VIP SUMMIT Draft Innovation in the Cloud & the Importance of Security Guest Speaker: Steve Chappell, Chief Operating Officer, Wedge

Add to Reading List

Source URL: www.netevents.org

Language: English - Date: 2015-06-04 08:03:01
504Computing / Computer networking / Internet Standards / Computer network security / Datakit / Telnet / Internet protocol suite / Firewall / UUCP / Simple Mail Transfer Protocol / Transmission Control Protocol / ARPANET

ches Fri Apr 20 07:46:11 EDT 1990 The Design of a Secure Internet Gateway Bill Cheswick AT&T Bell Laboratories

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2007-12-29 17:42:40
505Computing / Business / Economy / Computer network security / Cybercrime / Identity theft / Internet advertising / Rogue software / Spyware / Computer security / Computer repair technician / Antivirus software

www.agjsystems.com “16 Critical Questions You MUST Ask Before Hiring Any IT Company” If You Depend On Your Computer Network To Run Your Business, This Is One Guide You DON’T Want To Overlook!

Add to Reading List

Source URL: d2oc0ihd6a5bt.cloudfront.net

Language: English - Date: 2016-04-13 23:37:50
506Computer security / Computing / Security / Data security / Cyberwarfare / Computer network security / ISO/IEC 27002 / Vulnerability / Information security management system / Security controls / Information security / ISO/IEC 27001:2013

WRITTEN INFORMATION   SECURITY PROGRAM (WISP) ACME Consulting Services, Inc.    Copyright © 2016 

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:17:59
507Computing / Cloud infrastructure / Computer network security / Computer security / Cloudera / Hadoop / Threat / Big data / Cloud computing / Analytics

Cloudwick One® OSAS Cloud and Data Center Cybersecurity OPEN SOURCE ADAPTIVE SECURITY (OSAS) In today’s world of one data breach after another, enterprises are faced with a hostile information security environment. It

Add to Reading List

Source URL: www.cloudwick.com

Language: English
508Computing / Information technology management / Information technology / Network management / System administration / Computer security / Information privacy / Data security / Payment Card Industry Data Security Standard / Syslog / Log management / Information security

Standard: PCI Data Security Standard (PCI DSS) Version: 1.0 Date:

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2016-05-31 08:37:10
509Security / Surveillance / Prevention / Safety / Video / Physical security / Video management system / IP camera / NVR / Closed-circuit television / Computer data storage / Storage area network

Figure1_Basic Network Layout

Add to Reading List

Source URL: www.surveon.com

Language: English - Date: 2014-09-30 05:38:09
510Computing / Media access control / Computer networking / Network architecture / Espionage / Carrier sense multiple access with collision avoidance / IEEE 802.11 / Covert channel / Carrier sense multiple access / Collision / Traffic flow / Channel access method

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 3, MARCHA Timing Channel Spyware for the CSMA/CA Protocol

Add to Reading List

Source URL: coleman.ucsd.edu

Language: English
UPDATE