Open Computer Network

Results: 913



#Item
781Computing / Trusted Network Connect / IF-MAP / Trusted Platform Module / Network Access Control / Trusted system / Virtual private network / Network security / Operating system / Computer security / Computer network security / Trusted computing

TNC: Open Standards for Network Security Automation Copyright © 2010 Trusted Computing Group

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:54
782Computer network security / Hacking / Software testing / Vulnerability / Blacklist / Open Vulnerability and Assessment Language / Extensible Configuration Checklist Description Format / Security Content Automation Protocol / Computer security / Cyberwarfare / Computing

Enhancing SCAP: Whitelist-based Image Management W. Wyatt Starnes SignaCert, Inc. - Founder and CEO ITSA Conference – October 2009 © Copyright 2008 SignaCert®, Inc.

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:49
783Computing / Electronic engineering / Electronics / Metro Ethernet / HP Networking Products / Ethernet / Network switch / Computer network

Ministry of Citizens  Services’ and Open  Government     

Add to Reading List

Source URL: www.cio.gov.bc.ca

Language: English - Date: 2012-10-02 19:48:16
784Cisco Systems VPN Client / Cisco Systems / Virtual private network / Password / Cyberwarfare / Computer network security / Computing / Tunneling protocols

Cisco AnyConnect Secure Mobility Client Installation for Windows 8 64-bit Step 1: Open a web browser (e.g. Internet Explorer, Firefox, Google Chrome.) Step 2: Navigate to http://vpn.arizona.edu. Step 3: Log in using NetI

Add to Reading List

Source URL: uits.arizona.edu

Language: English - Date: 2013-02-07 13:31:45
785Certificate authorities / Comodo Group / Electronic commerce / Computer security / Public key certificate / Code signing / Comodo / S/MIME / GlobalSign / Cryptography / Key management / Public-key cryptography

Cost-Effective PKI Certificates Give IT Powerful Control over Application Usage and a Seamless Experience for End Users When Open Finance Network needed Digital Client Authentication Certificates - one for every financia

Add to Reading List

Source URL: www.instantssl.com

Language: English - Date: 2014-07-25 21:23:05
786Internet standards / Routing protocols / Internet protocols / OSI protocols / Computer networking / Communications protocol / Open Shortest Path First / Link layer / Computer network / Computing / Network architecture / Internet

Indiana Department of Education Academic Standards Course Framework BRIDGES TO THE INTERNET Bridges to the Internet focuses on learning the fundamentals of networking, routing, switching and related protocols. In this co

Add to Reading List

Source URL: www.doe.in.gov

Language: English - Date: 2014-01-09 10:41:42
787Cyberwarfare / Computer crimes / Computer security / Public safety / International Multilateral Partnership Against Cyber Threats / Cyber-security regulation / Information Technology Industry Council / Information security / European Network and Information Security Agency / Security / Crime prevention / National security

Comments on “Joint Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions—Cybersecurity Strategy of the European Union: An Open, Safe, and S

Add to Reading List

Source URL: www.itic.org

Language: English - Date: 2013-09-03 13:21:26
788Clallam Bay Corrections Center / Moodle / Internet / Open source / Kloxo / Web server / World Wide Web / Virtual machine / E-learning / Software / Educational software / Education

Useful Technology Resources for Correctional Education Programs inside Prisons Peninsula College, Port Angeles, WA Peninsula College uses virtual machines to operate an internet-like computer network of 90+ computer stat

Add to Reading List

Source URL: www.pencol.edu

Language: English - Date: 2013-05-03 00:58:39
789Mitre Corporation / Open Vulnerability and Assessment Language / Trusted Network Connect / Mitre / Security Content Automation Protocol / Computer security / Clothing / Christianity

Change in Operational Model for OVAL Over the past two years, the security automation leadership within the US Government (DHS, NIST, and NSA) has been developing a long-term strategy for security automation that focuse

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2014-05-14 17:18:06
790Distributed data storage / GlusterFS / Ceph / Gluster / Proprietary software / Open source / Sun Open Storage / Clustered file system / Computing / Network file systems / Computer law

Digital preservation with open source Sage Weil Founder and CTO, Inktank What is Ceph?

Add to Reading List

Source URL: www.digitalpreservation.gov

Language: English - Date: 2013-09-22 18:52:58
UPDATE