Secure Network Communications

Results: 121



#Item
61Security / Siemens / Internet protocol suite / Computer security / Computer network / IP address spoofing / Automation / Secure communication / Firewall / Technology / Computer network security / Computing

Information Security in Industrial Communications White Paper • 2003 SIMATIC NET

Add to Reading List

Source URL: www.siemens.com.ar

Language: English - Date: 2003-07-31 15:47:00
62Computer architecture / Tunneling protocols / Internet protocols / Internet standards / Virtual private network / Extranet / Internet security / IPsec / Transport Layer Security / Computing / Network architecture / Computer network security

Secure Corporate Communications over VPN-Based WANs REZAN FISLI Master’s Degree Project

Add to Reading List

Source URL: www.nada.kth.se

Language: English
63Telecommunications engineering / Videotelephony / Network performance / Streaming / Teletraffic / Quality of service / Computer network / Router / Resource reservation protocol / Network architecture / Computing / Electronic engineering

GLOBAL SECURE COMMUNICATIONS Global Secure Communications: Challenges and Opportunities Bharat T. Doshi

Add to Reading List

Source URL: www.jhuapl.edu

Language: English - Date: 2006-09-15 16:05:26
64Nippon Telegraph and Telephone / Computer network security / Internet privacy / NTT Europe Ltd / Quality of service / Virtual private network / IP multicast / ACCESS / NTT Communications Corp / Network architecture / Computing / Computer architecture

SERVICE BROCHURE Global IP-VPN service from NTT Communications Secure, scalable global networking

Add to Reading List

Source URL: www.eu.ntt.com

Language: English
65System software / MRV Communications / Photonics / Computer network security / DMZ / Console server / TACACS+ / RADIUS / Secure Shell / Out-of-band management / Information technology management / Computing

Case Study: Nationwide Bank Goes Out-of-Band to Manage Security INTRODUCTION Application Challenges • Deploy network infrastructure equipment

Add to Reading List

Source URL: www.mrv.com

Language: English - Date: 2014-11-19 18:12:53
66Information / Computer network security / Deep packet inspection / Online chat / Secure Shell / SOCKS / Application layer / Communications protocol / Daemon / Computing / Data / Internet protocols

Protocol Misidentification Made Easy with Format-Transforming Encryption Kevin P. Dyer Scott E. Coull

Add to Reading List

Source URL: kpdyer.com

Language: English - Date: 2014-11-02 17:58:24
67Management / National security / Computer network security / Computer security / Secure communication / Supply chain / Supply chain cyber security / Business / Technology / Supply chain management

Opening Statement of the Honorable Greg Walden Subcommittee on Communications and Technology Hearing on “Cybersecurity: An Examination of the Communications Supply Chain” May 21, 2013 (As Prepared for Delivery)

Add to Reading List

Source URL: energycommerce.house.gov

Language: English - Date: 2013-05-21 11:08:05
68Computer security / Crime prevention / Electronic commerce / Secure communication / Supply chain cyber security / Security / National security / Computer network security

Opening Statement of the Honorable Fred Upton Subcommittee on Communications and Technology Hearing on “Cybersecurity: An Examination of the Communications Supply Chain” May 21, 2013 (As Prepared for Delivery) Wired

Add to Reading List

Source URL: energycommerce.house.gov

Language: English - Date: 2013-05-21 11:08:05
69Computer security / Crime prevention / National security / Secure communication / Cyber-security regulation / Public safety / National Cyber Security Division / Cyberwarfare / Security / Computer network security

October 10, 2014 Submitted electronically to [removed] Comments of the Communications Sector Coordinating Council Re: “Experience with the Framework for Improving Critical Infrastructure Cybersecurity”

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-23 14:08:46
70Technology / Secure Communications Interoperability Protocol / Fax / Integrated Services Digital Network / Secure voice / Command and Data modes / Secure Terminal Equipment / Secure communication / Electronic engineering / Security

Instructions for Sending a Secure Fax

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2015-01-09 02:42:59
UPDATE