Computer network security

Results: 18127



#Item
91Computing / Computer network security / Network architecture / Wireless networking / Local area networks / IEEE 802.11 / Computer security / IEEE 802.11e-2005 / Wireless security / Denial-of-service attack / Data link layer / Transmission Control Protocol

Detecting Identity Spoofs in IEEE 802.11e Wireless Networks

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English
92Computer network security / Computing / Computer security / Cyberwarfare / Bastion host / Firewall / Dual-homed / Router / Guard / Subnetwork / Gateway / Distributed firewall

Thinking About Firewalls Marcus J. Ranum Trusted Information Systems, Inc. Glenwood, Maryland Abstract

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2007-12-29 17:42:39
93Computing / Wireless networking / Security / Computer network security / Information technology management / Secure communication / Data security / Wireless sensor network / Steganography / Computer security / Artificial immune system / Quality of service

CURRICULUM VITAE Prof. Sugata Sanyal School of Technology & Computer Science Tata Institute of Fundamental Research Homi Bhabha Road, Mumbai – 400005, India. Email:

Add to Reading List

Source URL: www.tifr.res.in

Language: English - Date: 2011-12-14 05:57:20
94Network protocols / Computing / Computer architecture / Network architecture / Universal Plug and Play / Simple Service Discovery Protocol / Internet Gateway Device Protocol / Service discovery / Windows Rally / Streamium

Security Flaws in Universal Plug and Play Unplug. Don’t Play. January 2013 HD Moore

Add to Reading List

Source URL: hdm.io

Language: English - Date: 2015-12-05 20:38:27
95Computing / Computer network security / Ingate Systems / Ingate / SIP trunking / Network address translation / Technology / Firewall / Network architecture / Videotelephony

Welcome to the Ingate SIParator Training and Become Certified on the Ingate E-SBC products! Learn the ins and outs of working with Ingate SIParator/Firewalls to enable SIP trunking and all SIP based unified communication

Add to Reading List

Source URL: www.ingate.com

Language: English - Date: 2015-09-14 05:03:44
96Cyberwarfare / Cybercrime / Computer network security / Computer security / Security / Identity theft / Phishing / Spamming / Threat / Targeted threat / Advanced persistent threat

PhishLabs_Logo_CMYK_notag.eps

Add to Reading List

Source URL: pages.phishlabs.com

Language: English - Date: 2016-07-20 14:05:07
97Computing / Security / Computer network security / Prevention / Crime prevention / Cryptography / Information governance / National security / CyberCIEGE / Server / Computer security / Email

Microsoft Word - csetCyberCIEGE110609final.docx

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-07-08 13:42:25
98Computing / Parallel computing / Computer network security / Network architecture / Network performance / Science DMZ Network Architecture / Emerging technologies / Computer cluster / Nanomaterials / Apache Hadoop / Big data

News Center for HighPerformance

Add to Reading List

Source URL: chpc.utah.edu

Language: English - Date: 2016-03-24 15:04:37
99Security / Computer security / Prevention / Cybercrime / Cyberwarfare / National security / Computer network security / Threat / Supply chain attack / Outline of computer security

Fox-IT vormtaal patroon-0,3 cmyk

Add to Reading List

Source URL: www.cybersecurity.cz

Language: English - Date: 2016-04-25 14:30:54
100Computing / Networking hardware / IEEE 802.11 / Local area networks / Computer network security / Wireless networking / Wireless distribution system / Router / Wi-Fi Protected Access / Wireless router / Wi-Fi / HP Networking Products

802.11a/n • 150Mbps CPE

Add to Reading List

Source URL: airnetwireless.net

Language: English - Date: 2014-07-25 18:17:00
UPDATE