Network security

Results: 23614



#Item
641Computer network security / Virtual private networks / Tunneling protocols / OpenVPN / Zeroshell / SSL-Explorer: Community Edition / SoftEther VPN

MOBILE VPN between OpenVPN and Zeroshell !" #

Add to Reading List

Source URL: digilander.libero.it

Language: English - Date: 2008-02-13 11:17:45
642Computer network security / CBRN defense / Emergency management / Radioactive contamination / Computer security / Threat

0 11 November 2012 Nieuwenhuizen EU FP 7 SPIRIT project concerning CBRE infrastructure protection

Add to Reading List

Source URL: www.iccss.eu

Language: English - Date: 2015-06-19 09:14:35
643Surveillance / Video surveillance / Video / Physical security / IP camera / Internet Protocol / Red Digital Cinema Camera Company / Closed-circuit television / NVR / AgriBank

Figure1_Basic Network Layout

Add to Reading List

Source URL: www.surveon.com

Language: English - Date: 2012-01-31 20:46:04
644Network architecture / Electronic voting / Server / Clientserver model / Communications protocol / Computer networking / Internet protocol suite / IMS security

Bilkent University Senior Design Project Smart-Vote: Electronic Voting System for Smartphones Department of Computer Engineering

Add to Reading List

Source URL: ivoteturkey.eu.pn

Language: English - Date: 2014-05-14 18:12:29
645Crime prevention / National security / Cryptography / Information governance / Cybercrime / Computer security / Internet privacy / National Security Agency / Network security

Network Security Activities Under the University’s Electronic Communications Policy This guidance is intended to assist the Campuses and Laboratories in undertaking additional network security efforts. This guidance sp

Add to Reading List

Source URL: security.ucop.edu

Language: English - Date: 2016-02-01 23:11:50
646Cyberwarfare / Cybercrime / Computer security / Computer network security / Secure communication / Cyber-security regulation / Michigan Cyber Range

OFFICE OF THE GOVERNOR October 2015 National Cyber Security Awareness Technology plays a vital role in our daily lives – California’s citizens,

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2015-10-22 12:53:02
647Humanitarian aid / Nutrition / Public health / Environmentalism / Sustainability / Poverty / Malnutrition / Food security / Diseases of poverty

U.S. Investment in Emerging Markets: Africa-U.S. University Partnerships Africa-U.S. Network of Centers of Excellence in Water and Environmental Science & Technology Tuskegee University and International Institute for Wa

Add to Reading List

Source URL: www.aplu.org

Language: English
648Computer network security / Multi-agent systems / Spamming / Botnet / Cyberwarfare / Distributed computing

Challenges in Experimenting with Botnet Detection Systems

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-08-24 13:54:47
649Computer network security / OWASP / Vulnerability / Application security

Vulnerability Management in an Application Security World AppSec DC November 12th, 2009

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:17:53
650Computer network security / Internet protocols / IP addresses / Internet Protocol / Internet Standards / Network address translation / Internet protocol suite / Application-level gateway / Transmission Control Protocol / IPv4 / Private network / IPv6

Network Working Group Request for Comments: 2663 Category: Informational P. Srisuresh M. Holdrege

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-02-04 15:16:08
UPDATE