Network security

Results: 23614



#Item
631Computer networking / Computer network security / Routing / Networking hardware / Router / Server appliance / Packet loss / Network address translation / Forwarding plane / Hop / Firewall / Traffic shaping

Forwarding Accountability: A Challenging Necessity of the Future Data Plane Christos Pappas, Raphael M. Reischuk, and Adrian Perrig ETH Z¨ urich {pappasch,reischuk,adrian.perrig}@inf.ethz.ch

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2016-02-16 05:45:02
632Secure communication / Public-key cryptography / Key management / Cryptographic protocols / Internet Standards / Cipher suite / Transport Layer Security / Elliptic curve cryptography / Elliptic curve DiffieHellman / Key size / Key / Client certificate

Network Working Group Request for Comments: 4492 Category: Informational S. Blake-Wilson SafeNet

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-02-04 15:25:45
633First Responder Network Authority / Computer security / Rivada Networks

FirstNet and the Fire Service WHAT IS THE FIRST RESPONDER NETWORK AUTHORITY (FIRSTNET)? FirstNet is an independent authority within the U.S. Department of Commerce’s National Telecommunications and Information Administ

Add to Reading List

Source URL: www.firstnet.gov

Language: English - Date: 2015-09-02 16:51:10
634Network architecture / Emerging technologies / Network function virtualization / Telecommunications systems / Computer network security / Outsourcing / Software-defined networking / Customer-premises equipment / Virtual private network / Cloud computing / Call centre / Customer experience

Technical Brief Randy Levensalor, Lead Architect, CableLabs, March 2016

Add to Reading List

Source URL: www.cablelabs.com

Language: English - Date: 2016-04-25 12:06:13
635Data security / Computer security / Security / Computer network security / Cryptography / Security controls / ISO/IEC 27002 / Vulnerability / Information security / Payment Card Industry Data Security Standard / Asset / Health Insurance Portability and Accountability Act

Microsoft Word - Vendor Compliance Program (VCP) (v2016.1)

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:18:13
636Wireless networking / Computer network security / IEEE 802.11 / Wi-Fi / IEEE 802.1X / Cryptographic protocols

How to Connect Your Android Device to the “KSU” WiFi Network 1. On the Home screen, click on your MENU icon or button. The screen below will appear at the bottom of your phone. Then select the Settings icon.

Add to Reading List

Source URL: ksuhousing.kennesaw.edu

Language: English - Date: 2015-09-01 10:59:13
637Cyberwarfare / Cybercrime / Computer network security / Spamming / National security / Botnet / Computer security / Phishing / Malware / Ransomware / Storm botnet / Supply chain attack

CYBER SECURITY VOCABULARY - For business leaders UNDERSTAND YOUR IT DEPARTMENT AND LEAD IN THE EVENT OF A CYBER CRISIS Ever found your IT team was speaking a different language when it came to cyber security?

Add to Reading List

Source URL: www.controlrisks.com

Language: English - Date: 2016-08-04 06:27:46
638Public-key cryptography / Hypertext Transfer Protocol / Computer network security / Public key infrastructure / Internet privacy / HTTP cookie / Email / Computer security

Techniques for Visual Feedback of Security State Tara Whalen and Kori Inkpen Dalhousie University Halifax, NS, Canada {whalen, inkpen}@cs.dal.ca Introduction and Overview

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English
639Internet protocols / Computer network security / Network address translation / Network protocols / Internet Protocol / Internet protocol suite / Application-level gateway / Resource Reservation Protocol / Transmission Control Protocol / Application layer / IPv6 / Traversal Using Relays around NAT

NAT Working Group Holdrege INTERNET-DRAFT Communications Category: Informational Srisuresh

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-06-21 11:58:17
640Computer network security / Hacking / Cross-site request forgery / Cross-site scripting / Vulnerability / CVSS / Web application security / Phorum / JavaScript / Internet forum / HTTP cookie / Computer security

Phorum http://www.phorum.org/ Full Disclosure v5.2.20 Advisory: VoidSecDate: 21 April 2016

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2016-04-21 11:38:00
UPDATE