Computer network security

Results: 18127



#Item
151Security / Cyberwarfare / Computer security / Computer network security / Cybercrime / E-commerce / Cryptography / National security / Online banking / Email / Identity theft / Malware

Microsoft Word - Sound Business PracticesBusinessesFinal042811

Add to Reading List

Source URL: www.nacha.org

Language: English
152Computing / Computer network security / Cyberwarfare / Computer security / Multi-agent systems / Spamming / Intrusion detection system / Malware / Computer virus / Botnet / Alert correlation / Infection

BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2007-06-29 16:14:13
153Computing / Cyberwarfare / Computer security / Computer network security / E-commerce / Secure communication / Web application security / Automated threat / OWASP / Vulnerability / Application security / Denial-of-service attack

............................................................... .............................................................. ............................................................... .............................

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-10-23 12:02:35
154Computer network security / Computing / Internet privacy / Network architecture / Crypto-anarchism / Computer security / Computer architecture / Virtual private networks

How to get access to Processing Servers Projects inside DAPA DAPA offer two solutions for processing data related to ongoing projects.  

Add to Reading List

Source URL: dapa.ciat.cgiar.org

Language: English - Date: 2015-02-20 09:23:24
155Computer network security / Computing / Computer security / Cyberwarfare / Layer 2 Tunneling Protocol / Ethernet / DMZ / Virtual private network / Network switch / Firewall / Light-emitting diode

CyberGuard SG User Manual CyberGuard 7984 South Welby Park Drive #101 Salt Lake City, Utah 84084

Add to Reading List

Source URL: go.mcafee.com

Language: English - Date: 2006-01-11 00:17:53
156Computer access control / Computer security / Security / Identity management / Cryptography / Cybercrime / Computer network security / Password / Internet privacy / Password manager / Password strength

FAB_OnlineBankingSecurityTips

Add to Reading List

Source URL: www.firstamb.net

Language: English - Date: 2015-10-14 13:11:43
157Computing / Cryptography / Wireless networking / Computer security / Cryptographic protocols / IEEE 802.11u / Computer network security / Extensible Authentication Protocol / IEEE 802.11 / Authentication

November 2007 doc.: IEEE2786r0 IEEE P802.11 Wireless LANs Liaison from IETF EMU to IEEEDate:

Add to Reading List

Source URL: mentor.ieee.org

Language: English - Date: 2011-06-28 18:39:10
158Computing / Cyberwarfare / Computer security / Computer network security / Spamming / Multi-agent systems / Cybercrime / Botnet / Malware / Antivirus software / Rootkit / Bitcoin

ReportThreats Predictions By McAfee® Labs™

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:00:32
159Security / Prevention / Safety / National security / Computer network security / Vulnerability / Infrastructure / Networks / Vulnerability assessment / Social vulnerability / Interdependent networks / Computer security

ITS-related transport concepts and organisations’ preferences for office locations

Add to Reading List

Source URL: www.tbm.tudelft.nl

Language: English - Date: 2015-12-12 11:54:15
160Cybercrime / Computing / Spamming / Cyberspace / Security / Social engineering / Computer network security / Phishing / Email spam / Vigilance / CUPS / Gmail

Using Signal Detection Theory to Measure Phishing Detection Ability and Behavior Casey Canfield Baruch Fischhoff

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-03 02:38:28
UPDATE