Open Computer Network

Results: 913



#Item
251Computer network security / Network virtualization / Virtualization / Computer network / Virtual private server / Hyper-V / OpenVZ / Virtual network / Full virtualization / System software / Software / Virtual machines

Bays et al. Journal of Internet Services and Applications:1 DOIs13174z RESEARCH Open Access

Add to Reading List

Source URL: www.jisajournal.com

Language: English
252Computer network security / Distributed computing architecture / Inter-process communication / Access control / Software testing / PlanetLab / E / Open proxy / Futures and promises / Computing / Software engineering / Computer programming

Email Prioritization: reducing delays on legitimate mail caused by junk mail

Add to Reading List

Source URL: www.hpl.hp.com

Language: English - Date: 2005-01-21 13:24:49
253Routing protocols / Internet broadcasting / Multicast / Internet protocols / Reliable multicast / Peer-to-peer / Routing / B-tree / IP multicast / Internet / Network architecture / Computing

Secure Acknowledgment of Multicast Messages in Open Peer-to-Peer Networks Antonio Nicolosi and David Mazi`eres NYU Department of Computer Science {nicolosi,dm}@cs.nyu.edu

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2004-02-17 00:28:34
254Turing Award laureates / ARPANET / J. C. R. Licklider / Bob Kahn / Douglas Engelbart / DARPA / Computer network / Augmentation Research Center / Internet / Computing / Technology / Science and technology in the United States

The Origins and Future of Open Source Software A NetAction White Paper By Nathan Newman

Add to Reading List

Source URL: www.netaction.org

Language: English - Date: 2007-08-27 11:32:21
255Software / Electronic commerce / Secure communication / Information technology management / Computing / Computer security / Internet security / Computer network security / EnGarde Secure Linux / Security

SM Internet Security Portfolio FROM "The Guardian Digital open source portfolio of products and services meet the stringent

Add to Reading List

Source URL: www.guardiandigital.com

Language: English - Date: 2010-08-11 14:48:55
256Cyberwarfare / Computing / Kerberos / Ticket Granting Ticket / Single sign-on / Authentication protocol / Key distribution center / Apple Open Directory / Computer network security / Computer security / Key management

Taming the Beast Assess Kerberos-Protected Networks Emmanuel Bouillon                           

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
257Computer security / Snort / McAfee / Malware / Intrusion prevention system / Intrusion detection system / Microsoft Security Essentials / Sourcefire / Computer network security / Software / System software

White Paper The Blended IPS: Leveraging Snort and Optimizing Malware Security An overture to the open source security community.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-10-20 18:39:36
258Network architecture / Software Defined Networking / OpenFlow / Cloud computing / Provisioning / Operating system / Hyper-V / System software / Computing / Computer architecture

The SDN Revolution: Transforming Next Generation Carrier Networks Rick Bauer, Managing Director Open Networking Foundation

Add to Reading List

Source URL: www.netevents.org

Language: English - Date: 2013-02-21 03:12:57
259Technology / Computer law / Electronic engineering / Network neutrality / National Telecommunications and Information Administration / Internet / Broadband networks / Open-access network / National broadband plans from around the world / Internet access / Broadband / Electronics

GSR10 - Draft best practices With the growing complexity of the ICT market environment, there is a need to rethink the different degrees of regulations to anchor national broadband strategies and regulatory frameworks

Add to Reading List

Source URL: www.itu.int

Language: English - Date: 2010-11-02 06:35:44
260Electronics / Internet / Computer law / New media / Scientific revolution / National Telecommunications and Information Administration / Broadband networks / National broadband plans from around the world / Network neutrality / Broadband / Internet access / Technology

GSR10 Best Practice Guidelines for Enabling Open Access 2nd Draft With the growing complexity of the ICT market environment, there is a need to rethink the different degrees of regulation to anchor national broadband

Add to Reading List

Source URL: www.itu.int

Language: English - Date: 2010-11-11 03:52:24
UPDATE