Network security

Results: 23614



#Item
531Computer security / Cyberwarfare / Security / Computer network security / Hacking / Software testing / Vulnerability / Application security / Web application firewall

Microsoft PowerPoint - VulnerabilityManagementInAnApplicationSecurityWorld_OWASPDC_20090805.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:23
532Cyberwarfare / Computer security / Computing / Computer network security / Threat model / Hacking / Software testing / Threat / STRIDE / Vulnerability / SQL injection / Security

Microsoft PowerPoint - ISSA threat modeling.ppt [Read-Only]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:19
533Cyberwarfare / Computer security / Computer network security / Security / Vulnerability / Zero-day / Software bug

Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response Zhen Huang Mariana D’Angelo

Add to Reading List

Source URL: www.eecg.toronto.edu

Language: English - Date: 2016-03-14 12:44:49
534Military / International security / Conferences / Academic publishing / Academic conference / Abstract / Information warfare / Robot / CORDA / NATO / European Distance and E-learning Network

CALL FOR PAPERS / PARTICIPATION IST-127/RSM-003 Specialists’ Meeting “INTELLIGENCE & AUTONOMY IN ROBOTICS” to be held in Bonn, Germany 25 – 27 October 2016

Add to Reading List

Source URL: www.fkie.fraunhofer.de

Language: English - Date: 2016-06-09 06:53:16
535Computing / Computer security / Cyberwarfare / Cryptographic protocols / Secure communication / Computer network security / Internet protocols / Computer access control / Cross-site scripting / Cheat sheet / Cross-site request forgery / Cheating in video games

OWASP Cheat Sheets Martin Woschek, April 9, 2015 Contents I

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-04-23 16:03:46
536Statistics / Computer security / Computer network security / Outlier / Statistical analysis / Anomaly / Threat

Sequential Feature Explanations for Anomaly Detection Md Amran Siddiqui, Alan Fern, Thomas G. Die8erich and Weng-Keen Wong School of EECS

Add to Reading List

Source URL: intelligence.org

Language: English - Date: 2016-05-31 11:21:14
537Video / Digital media / Imaging / Computing / Surveillance / Security engineering / Security / Video management system / Windows Server / IP camera / Closed-circuit television / Server

A&H Software House Inc. Web: www.Luxriot.com Email: LUXRIOT® A & E Specifications / Features Luxriot® VMS is a highly stable software, easy on any network and very easy to deploy with the

Add to Reading List

Source URL: www.luxriot.com

Language: English - Date: 2016-05-08 15:54:40
538Computing / Security / Cyberwarfare / Computer security / Cybercrime / National security / Emerging technologies / Computer network security / Cloud computing / Smart grid / Cyber security standards / Cyber-physical system

Applied Cyber Security  ........................................................................................................................................... Overview  The    transformation    of    physi

Add to Reading List

Source URL: www.gian.iitkgp.ac.in

Language: English - Date: 2016-05-31 02:57:24
539Computing / Software / System software / Internet Protocol / Computer network security / Ping / Data security / TCP/IP stack fingerprinting / Cyberwarfare / Nmap / Raw socket / Internet protocol suite

Chatter on the Wire: A look at excessive network traffic and what it can mean to network security. by Eric Kollmann aka xnih v.1.0

Add to Reading List

Source URL: chatteronthewire.org

Language: English - Date: 2006-06-04 02:00:00
540Internet privacy / Computing / Computer security / Privacy / Cyberspace / HTTP cookie / Personally identifiable information / Medical privacy / Network Advertising Initiative / P3P

PRIVACY POLICY OF CYEST CORPORATION (PROPRIETARY) LIMITED (“CYEST”) 1. INTRODUCTION Cyest is sensitive to the private nature of information you provide to it as a

Add to Reading List

Source URL: www.cyestcorp.com

Language: English - Date: 2014-08-08 06:00:43
UPDATE