Process control network

Results: 146



#Item
121Multi-agent systems / Spamming / Botnet / Denial-of-service attacks / Inter-process communication / Internet security / Communications protocol / Netflow / Transmission Control Protocol / Computing / Computer network security / Data

CoCoSpot: Clustering and Recognizing Botnet Command and Control Channels using Traffic Analysis1 Christian J. Dietricha,c , Christian Rossowa,b , Norbert Pohlmanna a Institute for Internet Security, University of Applie

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2012-12-13 01:27:31
122Security / Information technology audit / Computer network security / Information technology management / Cyberwarfare / Information technology audit process / Mainframe audit / Computer security / Mainframe computer / Data security

DEPARTMENT OF CENTRAL MANAGEMENT SERVICES BUREAU OF COMMUNICATIONS AND COMPUTER SERVICES SERVICE ORGANIZATION CONTROL REPORT--- For the Year Ended: June 30, 2014 Release Date: July 2014 This Service Organization Control

Add to Reading List

Source URL: www.auditor.illinois.gov

Language: English - Date: 2014-07-24 10:50:31
123Entheogens / Health / World No Tobacco Day / BC Healthy Living Alliance / Tobacco control / Tobacco / Health policy

Tobacco Action Fund Activity Grants Guidelines and Process 1. To help celebrate World No Tobacco Day on May 31, the Tobacco Free Network and the Alliance for the Control of Tobacco would like to encourage Community Heal

Add to Reading List

Source URL: web.wnlsd.ca

Language: English - Date: 2014-05-15 08:19:49
124Auditing / Data security / National security / Information technology controls / Access control / Security controls / Internal audit / Audit / Information technology audit process / Security / Computer security / Computer network security

Microsoft Word[removed]docx

Add to Reading List

Source URL: www.myflorida.com

Language: English - Date: 2011-10-26 11:09:32
125Geographic information system / Database management systems / Database

DRAFT[removed]Oregon Transportation Network (OR-Trans) Quality Assurance/Quality Control (QAQC) Process

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2012-04-11 02:38:14
126Teletraffic / Data transmission / Network performance / Inter-process communication / Streaming / Traffic flow / Transmission Control Protocol / Router / Communications protocol / Computing / Data / Information

An Information Theoretic Approach for Shared Bottleneck Inference Based on End-to-end Measurements MIT/LCS/TM-604 By

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2010-02-11 15:10:45
127Digital-to-analog converter / Security / Electronics / Access control / Digital Access Carrier System / Metadata / Data & Analysis Center for Software / Digital signal processing / Data management / Technology

Marine Environmental Data and Information Network (MEDIN): Accreditation Process for Data Archiving Centres

Add to Reading List

Source URL: www.oceannet.org

Language: English - Date: 2010-01-12 11:07:24
128Network socket / Winsock / Remote procedure call / Internet protocols / Computer network programming / Microsoft Exchange Server / SIMPLE / Transmission Control Protocol / JSON-RPC / Computing / Inter-process communication / Concurrent computing

PDF Document

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2012-08-13 16:14:17
129Water law in the United States / Navajo Nation / Drinking water / Safe Drinking Water Act / Water quality / Water supply network / Bottled water / United States regulation of point source water pollution / California State Water Resources Control Board / Environment / Water / Clean Water Act

Public Water System & Bottled Water System Permitting A guide to NNEPA’s permitting process

Add to Reading List

Source URL: www.navajopublicwater.org

Language: English - Date: 2005-03-04 13:40:26
130Identity management / Role-based access control / XACML / Computer network security / National security / PERMIS / Authorization / Directory service / Filesystem permissions / Security / Computer security / Access control

WORKING DRAFT A SURVEY OF ACCESS CONTROL MODELS INTRODUCTION Computer systems and the information that they create, process, transfer, and store have become indispensable to the modern enterprise. In today’s on-demand,

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-08-31 01:00:00
UPDATE