Network security

Results: 23614



#Item
941Network management / Internet Standards / Internet protocols / System administration / Computer systems / Syslog-ng / Syslog / Balabit / Logfile / Log management / Log analysis / Information technology security audit

syslog-ng Store Box PRODUCT DESCRIPTION CopyrightBalaBit IT Security All rights reserved.

Add to Reading List

Source URL: log-management.it

Language: English - Date: 2014-05-07 13:40:47
942Computer network security / Software testing / Hacking / Computer security / Veracode / Common Weakness Enumeration / Vulnerability / Application security / Security testing / Software quality / CVSS / Software bug

Veracode Summary Report Summary Report As of 18 Mar 2016 Prepared for: Prepared on:

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2016-04-06 15:04:57
943Climate change / Adaptation to global warming / Global warming / Food security / International development / Climate change adaptation in Nepal / Sustainable Mekong Research Network

Smallholder farmer perceptions and experiences of climate change adaptation policies in semi-arid district of Zvishavane, Zimbabwe Varaidzo Chinokwetu1, Patience Mutopo2, Chipo Plaxedes Mubaya3 1.  Centre  for  

Add to Reading List

Source URL: climatestrategies.org

Language: English - Date: 2016-07-05 06:51:03
944Computer security / Hacking / Software testing / Computer network security / Attack patterns / Recommender system / Text mining / Event correlation / Data mining / CAPEC / Intrusion detection system / Information security operations center

Mining known attack patterns from security-related events Nicandro Scarabeo1,2 , Benjamin C.M. Fung3 and Rashid H. Khokhar4 1 Department of Electrical and Information Engineering, University of Cassino and Southern Lazi

Add to Reading List

Source URL: peerj.com

Language: English - Date: 2015-10-07 04:49:41
945Cybercrime / National security / Videotelephony / Computer network security / Computer security / Cryptography / Email / Samsung Electronics / Samsung / Outlook.com / Canning

Microsoft Word - Session on 28 May 15.doc

Add to Reading List

Source URL: www.redas.com

Language: English - Date: 2015-05-17 22:11:21
946Proprietary software / Rogue software / Antivirus software / Computer network security / Identity theft / Spyware / Spybot  Search & Destroy / Microsoft Windows / Norton AntiVirus / Internet Explorer / Windows Vista

Personal InnoVia User Manual 3rd Edition

Add to Reading List

Source URL: www.ntreis.net

Language: English - Date: 2011-08-12 12:06:45
947Building automation / Sustainable urban planning / Computer security / Wi-Fi / Internet privacy / Efficient energy use / Computer network

Using Existing* Networks For Energy Purposes Bruce Nordman, Alan Meier October 7, 2009 (*”existing” can be either those already in place today, or those installed in future for non-energy purposes) Much activity in e

Add to Reading List

Source URL: nordman.lbl.gov

Language: English - Date: 2011-10-17 19:46:05
948Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
949Network protocols / Internet protocols / Internet Standards / IP multicast / Multicast / Tor / Overlay multicast / Mechanistic target of rapamycin / Traffic analysis / Internet Relay Chat / Reliability / Email

Proceedings on Privacy Enhancing Technologies ; ):22–39 Dong Lin, Micah Sherr, and Boon Thau Loo Scalable and Anonymous Group Communication with MTor Abstract: This paper presents MTor, a low-latency anonymous

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2016-07-26 12:57:18
950Public records / Intellectual property law / Copyright law of the United States / Copyright

2016 International Conference on Network Security (ICNS2016) http://www.icns.org/

Add to Reading List

Source URL: www.icns.org

Language: English - Date: 2016-03-15 05:51:55
UPDATE