Software agent

Results: 1391



#Item
591Human–computer interaction / User interfaces / User interface / Virtual reality / Human–computer interaction / Graphical user interfaces / Software agent / User / Direct manipulation interface / User interface techniques / Software / Computing

[removed]pp[removed]r1ah[removed]:54 AM

Add to Reading List

Source URL: web.media.mit.edu

Language: English - Date: 2001-06-22 19:16:49
592Network architecture / SFlow / Network switch / Router / Simple Network Management Protocol / Datagram / Network address translation / Traffic flow / Network management / Computing / Information technology management

sFlow (http://www.sflow.org) sFlow Agent Software Description[removed]

Add to Reading List

Source URL: www.inmon.com

Language: English - Date: 2011-08-04 19:35:05
593Secure Shell / Software / SSH Communications Security / Cryptographic protocols / SSH1 / Ssh-keygen / Remote administration software / Ssh-agent / Cryptographic software / Cryptography / System software

SSH Communications Security Rolls Out Free Discovery Tool to Identify Risks in  Secure Shell Environments    SSH Risk Assessment Tool Enables Auditors and Security Teams to Quickly Collect and

Add to Reading List

Source URL: www.infosecurityproject.com

Language: English - Date: 2014-10-23 00:03:39
594Cryptographic software / Secure Shell / Ssh-keygen / Workflow technology / Workflow / Expect / Ssh-agent / OpenSSH / Software / Computing / System software

File Orchestration and Workflow Scheduling flux.ly Securing Operations over SSH in Flux Flux Announces SSH Command, SSH File Upload, and SSH File Download Actions Reading Time: 7 minutes

Add to Reading List

Source URL: flux.ly

Language: English - Date: 2015-03-06 11:36:49
595Software / Cross-platform software / Message transfer agent / Email client / Mail / Netscape / Freenet / Gmail / Bounce address / Email / Computing / Computer-mediated communication

Getting Connected: E-mail There are several ways that you can access the mail which is sent to your D.C. FreeNet account. Which of the methods you use should be a matter of which is convenient and suits your needs best.

Add to Reading List

Source URL: www.servintfree.net

Language: English - Date: 2000-03-16 17:30:50
596Computing / Espionage / Spamming / Multi-agent systems / Antivirus software / Botnet / Computer worm / Rootkit / Trojan horse / Cyberwarfare / Computer network security / Malware

COMP 3410 – I.T. in Electronic Commerce MalContent eSecurity Malware and Other Attacks

Add to Reading List

Source URL: rogerclarke.com.au

Language: English - Date: 2013-03-23 06:05:14
597Complex systems theory / Social networks / Peer-to-peer / Social networking service / Software agent / OpenSocial / Internet privacy / Recommender system / Distributed social network / Computing / Technology / Software

Paper Title (use style: paper title)

Add to Reading List

Source URL: ceur-ws.org

Language: English - Date: 2012-09-06 10:09:56
598Cyberwarfare / Computer security / Multi-agent systems / Antivirus software / Malware / Botnet / Phishing / Zombie / Microsoft Security Essentials / Computer network security / Spamming / Computing

Microsoft PowerPoint - 4. HKCERT - School Information and Server security_201106.ppt

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-08-31 06:18:36
599Email / Cross-platform software / Web 2.0 / Gmail / Internet privacy / Webmail / Mail / Message transfer agent / Email client / Software / Computing / Computer-mediated communication

©2007 Glass Bead Software, LLC. All Rights Reserved. http://www.glassbead.com Rev[removed]v5.0 CHAPTER 1: GETTING STARTED .............................................................................................

Add to Reading List

Source URL: www.glassbead.com

Language: English - Date: 2006-10-08 07:48:13
600User interfaces / Programming by demonstration / Imitation / Graphical user interface / Human–computer interaction / Event-driven programming / Programming by example / User / Intelligent agent / Programming paradigms / Computing / Software engineering

Art Imitates Life: Programming by Example as an Imitation Game

Add to Reading List

Source URL: web.media.mit.edu

Language: English - Date: 2003-01-24 17:12:52
UPDATE