and Security Technologies

Results: 1110



#Item
211Anticipatory thinking / Bioterrorism / Futurology / Simulation / Anthrax attacks / Human decontamination / Security / Biological warfare / Terrorism / Prevention

1 Information Technologies for Civilian Bioterrorism Response Paul Y. Oh, Ruifeng Zhang, Charles Mode and Sherri Jurgens Drexel University, Philadelphia PA 19104

Add to Reading List

Source URL: prism2.mem.drexel.edu

Language: English - Date: 2008-10-12 15:57:37
212Security / Honeypot / Honeyd / Malware / Antivirus software / Threat / Computer worm / Client honeypot / Computer network security / Cyberwarfare / Computer security

SEVENTH FRAMEWORK PROGRAMME Information & Communication Technologies Trustworthy ICT NETWORK OF EXCELLENCE A European Network of Excellence in Managing Threats and

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-14 13:46:14
213Domain name system / Internet protocols / Akamai Technologies / Content delivery network / Computer network security / Anycast / Domain Name System Security Extensions / Denial-of-service attack / Domain name / Internet / Network architecture / Computing

AKAMAI WEB PERFORMANCE SOLUTIONS: PRODUCT BRIEF Fast DNS DNS resolution that is fast, reliable and secure

Add to Reading List

Source URL: www.akamai.de

Language: English - Date: 2014-07-18 14:04:01
214Association of Commonwealth Universities / University of the South Pacific / Information and communication technologies in education / Information and communications technology / Computing / Information / United Nations Information and Communication Technologies Task Force / World Information Technology and Services Alliance / Communication / Information technology / Technology

JAPAN PACIFIC ICT CENTRE & ICT FOR HUMAN DEVELOPMENT & SECURITY AT USP Prof. Eduard Babulak FRSA, FBCS, SMIEEE, SMACM Professor of Computing Science and Information Systems Director of Japan Pacific ICT Centre Chair of t

Add to Reading List

Source URL: linc.mit.edu

Language: English - Date: 2014-07-24 17:07:22
215Internet / Prolexic Technologies / Akamai Technologies / Denial-of-service attack / Network architecture / Denial-of-service attacks / Computer network security / Computing

AKAMAI WEB SECURITY SOLUTIONS: PRODUCT BRIEF Prolexic Connect As businesses and other organizations move increasingly online, the frequency, scale, and sophistication of denial-of-service (DoS) and distributed denial-of

Add to Reading List

Source URL: www.akamai.de

Language: English - Date: 2015-03-27 06:58:01
216Content delivery network / Internet / Cloud computing / Computing / Akamai Technologies

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Site Shield Defends the origin by cloaking web infrastructure and reducing vulnerability Everyone connected to an enterprise – customers, employees and partners – expe

Add to Reading List

Source URL: www.akamai.fr

Language: English - Date: 2014-07-18 11:30:01
217Thought / Calibration / Standards / Traceability / Accuracy and precision / Kilogram / Global Monitoring for Environment and Security / Remote sensing / Measurement / Statistics / Metrology

TRUTHS: a component of an “international calibration constellation” to meet the needs of climate Nigel Fox Optical Technologies and Scientific Computing Tm

Add to Reading List

Source URL: map.nasa.gov

Language: English - Date: 2007-07-17 16:18:00
218Internet / Akamai Technologies / Denial-of-service attack / Network architecture / Speedera Networks / Denial-of-service attacks / Prolexic Technologies / Computing

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Prolexic Routed DDoS defense for protecting data center infrastructures against large, complex attacks Organizations increasingly interact with customers, employees and pa

Add to Reading List

Source URL: www.akamai.fr

Language: English - Date: 2014-07-18 11:24:01
219Internet / Prolexic Technologies / Akamai Technologies / Denial-of-service attack / Network architecture / Denial-of-service attacks / Computer network security / Computing

AKAMAI WEB SECURITY SOLUTIONS: PRODUCT BRIEF Prolexic Connect As businesses and other organizations move increasingly online, the frequency, scale, and sophistication of denial-of-service (DoS) and distributed denial-of

Add to Reading List

Source URL: www.akamai.fr

Language: English - Date: 2015-03-27 06:58:01
220Security / Hacking / Crime prevention / Malware / Threat / Targeted threat / Vulnerability / International Cybercrime / Cyberwarfare / Computer network security / Computer security

SEVENTH FRAMEWORK PROGRAMME Information & Communication Technologies Secure, dependable and trusted Infrastructures COORDINATION ACTION Grant Agreement no

Add to Reading List

Source URL: www.ict-forward.eu

Language: English - Date: 2010-03-09 14:07:06
UPDATE