Secure transmission

Results: 298



#Item
91Port / Network topology / Internet protocols / Secure Shell / Transmission Control Protocol

Microsoft Word - i11_1lab.doc

Add to Reading List

Source URL: www.cse.wustl.edu

Language: English - Date: 2011-10-24 02:57:02
92Internet protocols / Cryptographic software / Internet privacy / Remote administration software / Secure Shell / Proxy server / Port / Transmission Control Protocol / Network address translation / Computing / System software / Internet

REX: Secure, Extensible Remote Execution Michael Kaminsky, Eric Peterson, Daniel B. Giffin, Kevin Fu, David Mazières, M. Frans Kaashoek MIT Computer Science and Artificial Intelligence Laboratory, NYU Department of Comp

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2004-05-05 13:52:30
93Data / Session / Secure Shell / Transmission Control Protocol / Communications protocol / NetBIOS / Windows Remote Assistance / X Window System / Computing / Software / Network protocols

Semi-Automated Discovery of Application Session Structure Jayanthkumar Kannan Jaeyeon Jung

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2006-10-03 02:32:13
94Internet protocols / Domain name system / Networks / Secure communication / Content delivery network / Transmission Control Protocol / Hostname / Hosts / Load balancing / Computing / Network architecture / Computer networking

A Longitudinal View of HTTP Traffic⋆ Tom Callahan† , Mark Allman‡ , Vern Paxson‡,¶ † Case Western Reserve University, ‡ International Computer Science Institute ¶

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2010-02-11 12:06:50
95Secure Shell / Firewall / Transmission Control Protocol / Port / Packet Processing / Data / Computing / Computer network security / Internet protocols

The Open Networking Lab Part I

Add to Reading List

Source URL: www.cse.wustl.edu

Language: English - Date: 2010-02-18 20:59:04
96Transmission Control Protocol / Throughput / Traffic flow / Secure Shell / Information / Data / Network performance / Iperf / Computing

Microsoft Word - i11_3lab.doc

Add to Reading List

Source URL: www.cse.wustl.edu

Language: English - Date: 2011-11-14 04:01:44
97Knowledge / International recognition of the National Transitional Council / National Telecommunication Corporation / Academic transfer / Transcript / Family Educational Rights and Privacy Act

A T- A - G L A N C E National Transcript Center FAQs Security: How secure is the transmission of electronic records/transcripts sent through NTC?

Add to Reading List

Source URL: www.hobsons.com

Language: English - Date: 2013-07-01 10:38:26
98Internet protocols / Internet standards / Computer network security / Secure Shell / Port / Transmission Control Protocol / Firewall / Ssh-keygen / FTPS / Computing / Network architecture / Internet

DATA SHEET FASP™ Security Model Bulletproof security for business-critical digital assets All Aspera products have complete, builtin

Add to Reading List

Source URL: asperasoft.com

Language: English - Date: 2014-06-23 20:12:54
99Internet / Internet standards / Computer network security / Cyberwarfare / Streaming / Transmission Control Protocol / Port / Transport layer / Secure Shell / Computing / Internet protocols / Network architecture

Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection Holger Dreger TU M¨unchen Anja Feldmann

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2009-04-11 23:28:18
100Communications protocol / Secure Shell / Stepping Stones / Computing / Data / Information / Transmission Control Protocol

Detecting Stepping Stones Yin Zhang and Vern Paxson Abstract The problem of detecting stepping stones was first addressed in a ground-breaking paper by Staniford-Chen and

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-24 05:45:16
UPDATE