Network security

Results: 23614



#Item
811Computer network security / Computer security / Cybercrime / National security / Antivirus software / Malware / Threat

Presentation Eric HOUDET Mission Statement: Quarkslab mission is to protect sensitive data for companies facing highly sophisticated cyber-attacks. Therefore, we provide

Add to Reading List

Source URL: www.nitec.nato.int

Language: English - Date: 2016-06-08 10:31:21
812Information technology management / National security / E-commerce / Computer network security / Computer security / Cryptography / Software / Business process management

Microsoft Word - This Time The Gathering Storm is Digital.doc

Add to Reading List

Source URL: ontopilot.com

Language: English - Date: 2016-03-21 13:58:05
813Spamming / Computer network security / Multi-agent systems / Cyberwarfare / Cybercrime / Bitcoin / Phishing / Computer security / ZeroAccess botnet / Botnet / IID / Command and control

MARKET INTELLIGENCE eCrime Trends Report: Fourth QuarterBroadway

Add to Reading List

Source URL: internetidentity.com

Language: English - Date: 2014-03-19 14:38:36
814Cyberwarfare / Computer network security / Multi-agent systems / Spamming / Cybercrime / Botnet / Sandvine / Denial-of-service attack / Computer security / Traffic classification

Protect your subscribers, services, and network from online threats Cyber Security

Add to Reading List

Source URL: www.sandvine.com

Language: English
815Network management / System administration / Crime prevention / National security / Secure communication / Logfile / Login / Syslog / Computer security / Security information and event management / Log analysis / Windows Security Log

PDF Document

Add to Reading List

Source URL: its.sjsu.edu

Language: English - Date: 2015-12-07 11:43:06
816Computer worms / Computer network security / Warhol worm / SQL Slammer / Computer security / Antibody

Design Space and Analysis of Worm Defense Strategies David Brumley Li-Hao Liu Pongsin Poosankam

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
817Computer network security / OpenVPN / Hotspot / Unified threat management / Virtual private network / Endian Firewall

Securing everyThing www.endian.com Endian Hotspot vs Endian UTM

Add to Reading List

Source URL: www.endian.com

Language: English - Date: 2016-02-24 12:15:03
818Energy economics / Home automation / Building automation / Environmental technology / Lighting / Efficient energy use / Lighting control system / Computer network / Energy policy / Computer security / Energy industry / Internet of things

Background Discussion for July 6 IEA Workshop on Digital Networks — www.iea.org/Textbase/events Buildings as Networks: Danger, Opportunity, and Guiding Principles for Energy Efficiency Alan Meier and Bruce Nordman1, L

Add to Reading List

Source URL: nordman.lbl.gov

Language: English - Date: 2007-11-15 16:35:32
819Nuclear program of North Korea / International sanctions / Nuclear proliferation / Money laundering / Terrorism financing / Politically exposed person / Economic sanctions / United Nations Security Council Resolution / International reactions to the 2013 North Korean nuclear test

Advisory FIN-2013-A005 Issued: July 1, 2013 Subject: Update on the Continuing Illicit Finance Threat Emanating from North Korea The Financial Crimes Enforcement Network (“FinCEN”) is issuing this Advisory to supplem

Add to Reading List

Source URL: www.fincen.gov

Language: English - Date: 2015-11-17 09:03:58
820Security Target / Networking hardware / Unidirectional network / Crime prevention / Cryptography / Information governance / National security / Evaluation Assurance Level / Common Criteria / Protection Profile / Toe / Nexor

FORT FOX HARDWARE DATA DIODE Security Target Common Criteria FFHDD – EAL4+ Classification INTERNAL

Add to Reading List

Source URL: www.commoncriteria-india.gov.in

Language: English - Date: 2013-01-03 08:44:04
UPDATE