Service layer

Results: 567



#Item
61

D ATA S H E E T I N F O R M AT I O N P R O D U C T S DigitalGlobe Basemap +Refresh USA USA Refresh is an application-ready subscription service that provides a current and complete imagery layer

Add to Reading List

Source URL: dg-cms-uploads-production.s3.amazonaws.com

Language: English - Date: 2015-08-26 15:25:24
    62

    Call For Service By Month Print Date/Time: Login ID: Source: Layer: Areas:

    Add to Reading List

    Source URL: satellitebeachpolice.sharepoint.com

    Language: English - Date: 2016-01-11 10:18:20
      63

      How To Set up QoS in Gigabit Networks 1 Introduction The service we want to enforce is a minimum bandwidth guarantee to a class of traffic under port congestion and a drop probability profile. This is a layer-3 provision

      Add to Reading List

      Source URL: datatag.web.cern.ch

      Language: English - Date: 2003-12-18 12:26:58
        64Malware / Computer worms / Denial-of-service attacks / SQL Slammer / Warhol worm / Witty / Code Red / Transmission Control Protocol / Transport layer / Computer network security

        The Top Speed of Flash Worms Stuart Staniford∗ David Moore† Vern Paxson‡

        Add to Reading List

        Source URL: www1.icsi.berkeley.edu

        Language: English - Date: 2012-09-26 16:43:06
        65Computing / Internet / Network architecture / Internet Standards / Internet protocols / Network protocols / Network booting / Dynamic Host Configuration Protocol / Network service / Universal Plug and Play / Proxy Mobile IPv6 / Transport Layer Security

        Defensics_TechSheet_LATEST_25Sept14.indd

        Add to Reading List

        Source URL: www.codenomicon.com

        Language: English - Date: 2016-03-02 04:58:12
        66Computer access control / Computer security / Cryptography / Access control / Password / Authentication / Challengeresponse authentication / Security question / Self-service password reset / Password policy

        Central Authentication Service Level 2 Security Instructions KFS will be implementing an additional layer of security to address an audit finding regarding our system access. Similar to other systems, KFS will ask users

        Add to Reading List

        Source URL: www.fmo.hawaii.edu

        Language: English - Date: 2014-07-21 21:53:18
        67Computing / Network architecture / Computer network security / OpenFlow / Cyberwarfare / OSI protocols / Transmission Control Protocol / Software-defined networking / SYN cookies / Denial-of-service attack / Data link layer / Forwarding plane

        AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks Seungwon Shin† † Vinod Yegneswaran‡

        Add to Reading List

        Source URL: www.openflowsec.org

        Language: English - Date: 2013-10-15 15:03:15
        68Computing / Tunneling protocols / Logical link control / Internet Standards / Modems / Point-to-point protocol over Ethernet / Network architecture / 6WIND / Data Plane Development Kit / Network function virtualization / Layer 2 Tunneling Protocol / Point-to-Point Protocol

        Enabling High-performance NFV for New Generation BRAS Services Telecom service providers are migrating edge, access and CPE networking infrastructure to open, programmable, software-based appliances with network function

        Add to Reading List

        Source URL: www.6wind.com

        Language: English - Date: 2014-04-11 20:43:26
        69Computing / Network architecture / Computer network security / OpenFlow / Cyberwarfare / OSI protocols / Transmission Control Protocol / Software-defined networking / SYN cookies / Denial-of-service attack / Data link layer / Forwarding plane

        AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks Seungwon Shin† † Vinod Yegneswaran‡

        Add to Reading List

        Source URL: faculty.cse.tamu.edu

        Language: English - Date: 2013-08-28 15:18:02
        70Internet protocols / Secure communication / Internet Standards / Transmission Control Protocol / Relay / Tor / Transport layer / Internet Relay Chat flood / HTTPS / Denial-of-service attack / Quality of service / Internet Relay Chat

        IMUX: Managing Tor Connections from Two to Infinity, and Beyond John Geddes† † Rob Jansen‡

        Add to Reading List

        Source URL: www-users.cs.umn.edu

        Language: English - Date: 2014-09-10 17:17:22
        UPDATE