Network security

Results: 23614



#Item
911Computer security / Data security / Computer network security / Security controls / Security / Information security / Information technology controls / Information technology audit / Vulnerability / Audit / Professional certification / ISO/IEC JTC 1/SC 27

Microsoft Word - NISTRev 4 Information Security Assessment Template (v2016.1)

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:18:08
912Crime prevention / Cryptography / Information governance / National security / Data security / Computer security / Backup / Internet / Android / Cloud computing / Computer network / Bring your own device

Document Type Doc ID Status

Add to Reading List

Source URL: www.astrazeneca.com

Language: English - Date: 2016-01-07 16:03:32
913Cryptographic protocols / Computer network security / IEEE 802.11 / Wireless networking / Wi-Fi Protected Access / 11i / Broadband

I N T U I C O M BroadBand Solutions 2.4GHzGHz BROADBAND SPECIFICATIONS K E Y F E AT U R E S

Add to Reading List

Source URL: www.econolite.com

Language: English - Date: 2016-02-19 05:24:26
914Vexillology / Flags / Capture the flag / Computer network security / Reduction

Automatic Problem Generation for Capture-the-Flag Competitions Jonathan Burket Carnegie Mellon University Peter Chapman

Add to Reading List

Source URL: jburket.com

Language: English - Date: 2015-08-11 15:26:34
915Transport Layer Security / Network architecture / Internet protocols / Cryptographic protocols / Network protocols / Gossip protocol / Hypertext Transfer Protocol / Internet Relay Chat / HTTPS / Certificate authority / Clientserver model / Simple Mail Transfer Protocol

Efficient Gossip Protocols for Verifying the Consistency of Certificate Logs Laurent Chuat Pawel Szalachowski

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-11-04 13:06:02
916E-commerce / Computer security / Computer network security / National security / Cryptography / Vulnerability / Intel Security / Threat / Attack / Malware / Payment Card Industry Data Security Standard / Security

Whitepaper The cost of ignoring malware: How attention to the basics can protect your organization from damaging attacks It’s not enough for an organization to

Add to Reading List

Source URL: www.nttsecurity.com

Language: English - Date: 2016-07-26 13:04:46
917Climate change policy / Emissions trading / Politics of global warming / United Nations Climate Change Conference / Low-carbon economy / Carbon tax / American Clean Energy and Security Act / Carbon Pollution Reduction Scheme / Investor Network on Climate Risk

 Global Climate Change Policy Tracker The Green Economy: The Race is On March 2010

Add to Reading List

Source URL: climate.columbia.edu

Language: English - Date: 2016-04-26 10:51:58
918Climate change / Urban studies and planning / American Farmland Trust / Conservation easement / Adaptation to global warming / Climate change mitigation / Williamson Act / Farmland Industries / Climate change and agriculture / Sustainable agriculture / California Department of Conservation / Farmland preservation

California Climate and Agriculture Network Triple Harvest: Farmland conservation for climate protection, smart growth and food security in California

Add to Reading List

Source URL: calclimateag.org

Language: English - Date: 2013-02-08 16:35:01
919Network management / Internet protocols / Computer network security / Network performance / NetFlow / IP Flow Information Export / Measuring network throughput / Traffic flow / Communications protocol / Packet analyzer / Pcap / Transport layer

Aggregation of Network Protocol Data Near its Source Marcel Fourn´e, Kevin Stegemann, Dominique Petersen, and Norbert Pohlmann Institute for Internet Security, Westf¨ alische Hochschule, University of Applied Sciences,

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 12:55:58
920Internet protocols / Cryptography / Schengen Routing / Internet Standards / Computer network security / Internet privacy / Schengen Area / Internet / Border Gateway Protocol / Routing / European integration / IPsec

Secure communication and digital sovereignty in Europe Norbert Pohlmann . Michael Sparenberg . Illya Siromaschenko . Kilian Kilden Institute for Internet Security – if(is) Westfälische Hochschule, Gelsenkirchen

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-12-20 07:45:16
UPDATE