TCP

Results: 1701



#Item
351

HERVÉ SCHAUER CONSULTANTS Cabinet de Consultants en Sécurité Informatique depuis 1989 Spécialisé sur Unix, Windows, TCP/IP et Internet Qualification des

Add to Reading List

Source URL: www.hsc.fr

Language: French - Date: 2014-01-23 10:51:10
    352

    Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2012-05-22 01:34:48
      353

      HERVÉ SCHAUER CONSULTANTS Cabinet de Consultants en Sécurité Informatique depuis 1989 Spécialisé sur Unix, Windows, TCP/IP et Internet OSSIR

      Add to Reading List

      Source URL: www.hsc.fr

      Language: French - Date: 2014-09-17 11:23:04
        354

        The Ataman®* TCP Remote Logon Services User’s Manual Copyright © , Ataman Software, Inc. All rights reserved. Copying and use of this document and the accompanying software is governed by the terms of the li

        Add to Reading List

        Source URL: www.ataman.com

        Language: English - Date: 2009-11-15 22:31:06
          355

          On the Efficiency and Fairness of TCP over Wired/Wireless Networks by Dimitrios Vardalis Master of Science in

          Add to Reading List

          Source URL: utopia.duth.gr

          Language: English - Date: 2003-05-19 11:05:05
            356

            Memoria Taller de Cierre Proyecto Regional “Fortalecimiento de la Gestión Participativa para el Desarrollo Sostenible de los Andes” TCP/RLA

            Add to Reading List

            Source URL: www.mountainpartnership.org

            Language: Spanish - Date: 2014-02-19 09:56:48
              357Provisioning / Transmission Control Protocol / Networking hardware / TCP offload engine / Cloud computing / Computing / Infrastructure optimization

              ECOS: Leveraging Software-Defined Networks to Support Mobile Application Offloading Aaron Gember, Christopher Dragga, Aditya Akella University of Wisconsin, Madison {agember,dragga,akella}@cs.wisc.edu

              Add to Reading List

              Source URL: pages.cs.wisc.edu

              Language: English - Date: 2012-09-12 09:51:19
              358

              TCP/IP に係る既知の脆弱性検証ツールの開発

              Add to Reading List

              Source URL: www.ipa.go.jp

              Language: Japanese - Date: 2013-07-10 06:35:46
                359Network address translation / Computer network security / TCP/IP stack fingerprinting / IPv4 / IP address / Private network / Transmission Control Protocol / Network protocols / Network architecture / Internet / Computing

                2014 IEEE Security and Privacy Workshops Can we identify NAT behavior by analyzing Traffic Flows? YaseminGokcen

                Add to Reading List

                Source URL: ieee-security.org

                Language: English - Date: 2014-04-30 03:11:08
                360Computer network security / Internet protocols / Information / TCP/IP / Secure communication / Tcpcrypt / Transmission Control Protocol / Secure Shell / Wireless security / Cryptographic protocols / Computing / Data

                The case for ubiquitous transport-level encryption Andrea Bittau Stanford Michael Hamburg Stanford

                Add to Reading List

                Source URL: tcpcrypt.org

                Language: English - Date: 2010-06-02 09:05:19
                UPDATE