Open Computer Network

Results: 913



#Item
431Internet access / Electronics / Computer law / Electronic engineering / Rights / Network neutrality / Internet service provider / Asymmetric digital subscriber line / G.992.5 / Digital subscriber line / Internet / Broadband

Midstate Communications Network Management Practices Policy Pursuant to the Federal Communications Commission’s newly enacted Open Internet Rules found in Part 8 of Title 47 of the Code of Federal Regulations, the poli

Add to Reading List

Source URL: web.midstatesd.net

Language: English - Date: 2014-04-21 18:42:09
432Computer architecture / Internet protocols / Internet standards / Computer networking / Network protocols / Constrained Shortest Path First / Open Shortest Path First / Multiprotocol Label Switching / Routing / Network architecture / Computing / Routing protocols

R3: Resilient Routing Reconfiguration Ye Wang⋆ Hao Wang† Ajay Mahimkar§ Richard Alimi⋆ Yin Zhang§ Lili Qiu§ Yang Richard Yang⋆ Google† The University of Texas at Austin§

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2010-07-07 10:04:02
433Computing / Security / Protected Extensible Authentication Protocol / Password / Authentication / Extensible Authentication Protocol / Wpa supplicant / Wireless networking / Computer network security / Technology

Connecting to WIT-SECURE Using a Non Wentworth PC For Windows Vista/7 Simply click on the wireless icon on your taskbar ( Open Network and Sharing Center.

Add to Reading List

Source URL: www.wit.edu

Language: English - Date: 2015-01-23 13:37:32
434Internet access / Computer law / Network neutrality / Broadband / Wireless networking / Network neutrality in the United States / Content delivery network / Internet / Google / Computing / Electronics / Technology

Before the Federal Communications Commission Washington, D.C[removed]In the Matter of Preserving the Open Internet Broadband Industry Practices

Add to Reading List

Source URL: entropyeconomics.com

Language: English - Date: 2010-05-06 12:29:43
435Internet / Routing / Internet standards / Internet protocols / Open Shortest Path First / Border Gateway Protocol / Administrative distance / Enhanced Interior Gateway Routing Protocol / Convergence / Network architecture / Routing protocols / Computing

WEST VIRGINIA UNIVERSITY AT PARKERSBURG UNIFORM COURSE SYLLABUS Name of Course: Advanced Routing (Cisco) Course Number: CIT 305 Department: Computer & Information Technology Prerequisites: CIT 206 or CCNA

Add to Reading List

Source URL: www.wvup.edu

Language: English - Date: 2013-07-26 17:07:54
436Wireless intrusion prevention system / Security / Computer security / Technology / Computer network security / Wireless networking / Data security / Aircrack-ng

OpenWIPS-ng A modular and Open source WIPS Thomas d’Otreppe, Author of Aircrack-ng 1

Add to Reading List

Source URL: sharkfest.wireshark.org

Language: English - Date: 2012-07-13 14:35:04
437Cyberwarfare / Computing / Kerberos / Ticket Granting Ticket / Single sign-on / Authentication protocol / Key distribution center / Apple Open Directory / Computer network security / Computer security / Key management

Taming the Beast Assess Kerberos-Protected Networks Emmanuel Bouillon                           

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
438Network architecture / Data security / Internet / Port / Firewall / Transmission Control Protocol / IP address / Open port / Network address translation / Computer network security / Computing / Internet protocols

SWGfL Change Control Form Enable Access to Computers on Your Network from the Internet

Add to Reading List

Source URL: slp.somerset.gov.uk

Language: English - Date: 2014-06-12 07:10:00
439Cloud computing / Computer network security / Cloud computing security / Security domain / Computing / Computer security / Security

Cloud Security[removed], Dr. Marcus Holthaus 1. Security 2. The cloud as a security improvement 3. Moving to the cloud

Add to Reading List

Source URL: www.ch-open.ch

Language: English - Date: 2013-06-14 11:41:50
440Computing / Law / Management / Strategic management / Business models / Open-source software / Free and open source software / Proprietary software / Network effect / Software licenses / Business / Computer law

To be published in the Proceedings of the Hawai‘i International Conference on System Sciences (HICSS-40), Waikola, Hawai‘i, January 3-7, 2007. © 2007 IEEE. Value Capture and Value Networks in Open Source Vendor Stra

Add to Reading List

Source URL: www.joelwest.org

Language: English - Date: 2010-01-24 11:16:55
UPDATE