Network security

Results: 23614



#Item
511Computing / Network architecture / Data transmission / Flow control / Computer networking / Network protocols / Network performance / Transmission Control Protocol / Acknowledgement / Channel / Network packet / Packet loss

64 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012 Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels

Add to Reading List

Source URL: coleman.ucsd.edu

Language: English
512Computer network security / Computing / Computer security / Cyberwarfare / Layer 2 Tunneling Protocol / DMZ / Virtual private network / Network switch / Secure Computing Corporation / Firewall

Secure Computing SnapGear™ User Manual Secure Computing 4810 Harwood Road San Jose, CA

Add to Reading List

Source URL: go.mcafee.com

Language: English - Date: 2006-08-31 03:33:18
513Computer security / Cyberwarfare / Computing / Computer network security / Web applications / Software testing / Hacking / Vulnerability / Application security / Web application security / Software quality / Foundstone

Microsoft PowerPoint - DenimGroup_IntroductionToApplicationSecurity

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:27:01
514Computing / Cryptography / Security / Prevention / Computer network security / Password / Cloud computing / Computer security / Cloud storage / File hosting service / Browser security / Salt

Media Shuttle’s Defense-inDepth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among the various pl

Add to Reading List

Source URL: info.signiant.com

Language: English - Date: 2016-07-16 02:23:51
515Missile defense / Ammunition / Nuclear weapons of the United States / Security / Missile Defense Agency / International relations / Ballistic missiles / Anti-ballistic missiles / United States national missile defense / Missile Technology Control Regime / Anti-Ballistic Missile Treaty / Cruise missile

Briefing Paper International Network of Engineers and Scientists Against Proliferation Western States Legal Foundation Briefing Paper

Add to Reading List

Source URL: www.wslfweb.org

Language: English - Date: 2014-08-08 15:37:18
516Security / Cybercrime / National security / Prevention / Computer network security / Computer security / Cryptography / Cyberwarfare / Cyber-attack / Cyberwarfare in the United States / The Centre for Secure Information Technologies

Microsoft Word - SOE - White PaperCyber Security Engineering Studio.docx

Add to Reading List

Source URL: marketing.sandiego.edu

Language: English - Date: 2016-03-03 12:31:40
517Internet / Computing / Domain name system / Network architecture / Internet Standards / Internet protocols / TSIG / Domain Name System Security Extensions / Dynamic DNS / Cryptographically Generated Address / DNSCurve / Name server

Master System & Network Engineering Securing the last mile of DNS with CGA-TSIG Research Project 2 Supervisors:

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2014-01-08 04:14:49
518Cyberwarfare / Computer network security / Denial-of-service attacks / Computing / Computer security / Internet Relay Chat / Denial-of-service attack / DDoS mitigation / Managed security service / Botnet / BlockDos / Prolexic Technologies

Service Provider Playbook_FINAL

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2016-06-20 09:50:39
519Security / Prevention / Cryptography / Crime prevention / Information governance / National security / Computer network security / Information flow / Database transaction / Computer security

Verifying information security of dynamic, decentralized systems Andrew Myers IC3 retreat, May 2016

Add to Reading List

Source URL: www.initc3.org

Language: English
520Computing / Internet / Network architecture / Net neutrality / Computer network security / Internet privacy / Cultural globalization / New media / Router / Peering / Virtual private network / Autonomous system

ATLAS Internet Observatory 2009 Annual Report C. Labovitz, S. Iekel-Johnson, D. McPherson Arbor Networks, Inc. J. Oberheide, F. Jahanian

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-11 18:23:19
UPDATE