Center for Internet Security

Results: 308



#Item
121Secure Network Performance Testing using SeRIF Charles J. Antonelli Center for Information Technology Integration University of Michigan Laurence Kirchmeier

Secure Network Performance Testing using SeRIF Charles J. Antonelli Center for Information Technology Integration University of Michigan Laurence Kirchmeier

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2005-06-22 20:14:25
122OVAL Board Meeting[removed]Attendees Morey Haber – BeyondTrust Inc. Jamie Cromer – Symantec Corporation Blake Frantz – Center for Internet Security Kent Landfield – McAfee, Inc.

OVAL Board Meeting[removed]Attendees Morey Haber – BeyondTrust Inc. Jamie Cromer – Symantec Corporation Blake Frantz – Center for Internet Security Kent Landfield – McAfee, Inc.

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2015-02-18 08:50:58
123OVAL Board Meeting[removed]Attendees Jamie Cromer – Symantec Corporation Blake Frantz – Center for Internet Security Tigran Gevorgyan – Qualys, Inc. Steve Grubb – Red Hat Inc.

OVAL Board Meeting[removed]Attendees Jamie Cromer – Symantec Corporation Blake Frantz – Center for Internet Security Tigran Gevorgyan – Qualys, Inc. Steve Grubb – Red Hat Inc.

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2015-02-18 08:50:58
124AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF  Prolexic Routed DDoS defense for protecting data center infrastructures against large, complex attacks  Organizations increasingly interact with customers, employees and pa

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Prolexic Routed DDoS defense for protecting data center infrastructures against large, complex attacks Organizations increasingly interact with customers, employees and pa

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2014-07-18 11:24:01
125Wiretapping the Internet C.J. Antonelli, P. Honeyman Center for Information Technology Integration, University of Michigan, Ann Arbor† ABSTRACT With network security threats and vulnerabilities increasing, solutions ba

Wiretapping the Internet C.J. Antonelli, P. Honeyman Center for Information Technology Integration, University of Michigan, Ann Arbor† ABSTRACT With network security threats and vulnerabilities increasing, solutions ba

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2002-03-05 15:54:08
126Hosted Video Solution CameraAgent.com Ca Agen Surveillance Center Install an IP Camera in Minutes. Collect Recurring Revenues for Years.

Hosted Video Solution CameraAgent.com Ca Agen Surveillance Center Install an IP Camera in Minutes. Collect Recurring Revenues for Years.

Add to Reading List

Source URL: www.cameraagent.com

Language: English - Date: 2010-10-11 17:15:29
127Connection statistics for LSU Health Sciences Center email system opportunistic transport layer security as of[removed]Connections that are listed as 100% Encrypted connections for a domain both incoming and outgoing in

Connection statistics for LSU Health Sciences Center email system opportunistic transport layer security as of[removed]Connections that are listed as 100% Encrypted connections for a domain both incoming and outgoing in

Add to Reading List

Source URL: www.lsuhsc.edu

Language: English - Date: 2015-03-02 11:11:24
128Identity Management in Social Networks Miguel-Ángel Monjas, David Suárez {miguel-angel.monjas, david.suarez.fuentes}@ericsson.com Technology and Innovation Unit, Madrid R&D Center Ericsson1 Position Paper for W3C Works

Identity Management in Social Networks Miguel-Ángel Monjas, David Suárez {miguel-angel.monjas, david.suarez.fuentes}@ericsson.com Technology and Innovation Unit, Madrid R&D Center Ericsson1 Position Paper for W3C Works

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2008-11-21 13:13:16
129Security of Information Systems and Networks Remarks of Marc Rotenberg, President Electronic Privacy Information Center Washington, DC APEC-OECD Workshop

Security of Information Systems and Networks Remarks of Marc Rotenberg, President Electronic Privacy Information Center Washington, DC APEC-OECD Workshop

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-21 01:40:04
130Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics Mark Handley and Vern Paxson AT&T Center for Internet Research at ICSI (ACIRI) International Computer Science Institute Berke

Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics Mark Handley and Vern Paxson AT&T Center for Internet Research at ICSI (ACIRI) International Computer Science Institute Berke

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2001-05-27 00:48:06