Open Computer Network

Results: 913



#Item
731Electronics / Law / Network neutrality / Video on demand / Computer law / Comcast Corp. v. FCC / Federal Communications Commission / Wireless broadband / Common carrier / Broadband / Technology / Internet access

Microsoft Word - GN[removed]CCIA Open Internet Comments July[removed]

Add to Reading List

Source URL: www.ccianet.org

Language: English - Date: 2014-07-15 15:29:52
732Password / Security / Computer security

HOW TO LOG INTO THE FIBIS DATABASE and FIBIS SOCIAL NETWORK Open the FIBIS website – www.fibis.org FIBIS Database Select the ‘fibis database’ from the black navigation bar

Add to Reading List

Source URL: www.fibis.org

Language: English - Date: 2014-08-06 04:50:19
733Internet standards / Computer network security / Campaign for Nuclear Disarmament / Glastonbury Festival / Open Shortest Path First / Router / DMZ / Broadcast address / Tor / Network architecture / Computing / Internet

OAlnet engineering group OAlnet Kcnncn Vcrcdhcn OAlnet September 15, 1 2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-11 16:38:04
734Network neutrality / Computer law / Broadband / Internet / Video on demand / Common carrier / Federal Communications Commission / Verizon Communications / Comcast / Internet access / Law / Technology

ITIF Files Comments With FCC On Open Internet

Add to Reading List

Source URL: www2.itif.org

Language: English - Date: 2014-07-15 14:51:38
735Security / Common Vulnerabilities and Exposures / Computer network security / Software testing / Hacking / Security Content Automation Protocol / Vulnerability / National Vulnerability Database / Open Vulnerability and Assessment Language / Computer security / Cyberwarfare / Mitre Corporation

Common Vulnerabilities and Exposures — CVE ® The Standard for Information Security Vulnerability Names CVE is a dictionary of common names for publicly known information security vulnerabilities. CVE’s common

Add to Reading List

Source URL: measurablesecurity.mitre.org

Language: English - Date: 2013-07-08 10:01:53
736Security / Hacking / Mitre Corporation / Open Vulnerability and Assessment Language / Vulnerability / Malware / Attack / Threat / Rootkit / Cyberwarfare / Computer security / Computer network security

Structured Threat Information eXpression (STIX™)

Add to Reading List

Source URL: measurablesecurity.mitre.org

Language: English - Date: 2013-07-08 10:01:53
737CVSS / Vulnerability / Computing / Open Vulnerability and Assessment Language / Computer security / Cyberwarfare / Computer network security

cybersecurity-measurement

Add to Reading List

Source URL: measurablesecurity.mitre.org

Language: English - Date: 2013-07-08 14:41:52
738Cyberwarfare / Mitre Corporation / Open Vulnerability and Assessment Language / Computer network security / Vulnerability / Social vulnerability / Computer security / Security / Risk

Open Vulnerabilty and Assessment Language 2 OVAL Definitions

Add to Reading List

Source URL: measurablesecurity.mitre.org

Language: English - Date: 2013-07-08 14:41:51
739Cybercrime / Spamming / Denial-of-service attacks / Computer crimes / Multi-agent systems / Denial-of-service attack / Botnet / Email spam / Cyberwarfare / Computer network security / Computing / Internet

How to prevent a disaster in cyberspace ? The need for an international approach to undermine the criminal cyber architecture Open-ended intergovernmental expert meeting on cybercrime UNODC Vienna, [removed]

Add to Reading List

Source URL: www.unodc.org

Language: English - Date: 2011-04-11 06:57:44
740Networking hardware / Computer network security / Router / Server appliance / Open Shortest Path First / MPLS VPN / Virtual private network / HP Network Management Center / HP FlexNetwork Architecture / Computing / Network architecture / Computer architecture

Fact sheet HP Virtual Services Router Product overview HP Virtual Services Router (VSR) is a

Add to Reading List

Source URL: h17007.www1.hp.com

Language: English - Date: 2013-04-26 05:04:40
UPDATE