Computer network security

Results: 18127



#Item
191Digital media / Security / Technology / Privacy of telecommunications / Cybercrime / Computer network security / Email / Internet privacy / Electronic Communications Privacy Act / Computer security / Internet / Privacy

ADMINISTRATIVE POLICY NOISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, iPads) I. POLICY ISSUANCE

Add to Reading List

Source URL: cityofsitka.com

Language: English - Date: 2015-08-13 16:32:14
192Software / Computing / System software / Computer network security / Iptables / Packet processing / Firewall / Netfilter / Communications protocol / Transmission Control Protocol / Ipfirewall / Statistical classification

Trees in the List: Accelerating List-based Packet Classification Through Controlled Rule Set Expansion Sven Hager Stefan Selent

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:55:48
193Security / Cyberwarfare / Prevention / Computer network security / Cybercrime / Email / Password / Computer security / Internet privacy / Rootkit / Computer virus / Internet

IT ACCEPTABLE USE STANDARDS PURPOSE A standard includes specific low level mandatory controls that help enforce and support a policy. The purpose of this document is to support and outline in detail

Add to Reading List

Source URL: bufa.ca

Language: English - Date: 2016-07-11 09:00:51
194Software / Computing / Computer network security / Cloud clients / Portable software / Web browsers / Hypertext Transfer Protocol / Browser security / HTTP cookie / JavaScript / Google Chrome / Browser extension

Run-time Monitoring and Formal Analysis of Information Flows in Chromium Lujo Bauer Shaoying Cai? Limin Jia Timothy Passaro Michael Stroucken Carnegie Mellon University ? Institute for Infocomm Research

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
195Computer network security / Computing / Cyberwarfare / Firewall / DMZ / Information technology management

CyberGuard SG User Manual CyberGuard 7984 South Welby Park Drive #101 Salt Lake City, Utah 84084

Add to Reading List

Source URL: go.mcafee.com

Language: English - Date: 2005-10-17 21:55:19
196Computing / Computer data storage / Telecommunications engineering / Data management / Fibre Channel / XAM / Storage area networks / Network protocols / Storage security / ISO/IEC 27040

STORAGE NETWORKING STANDARDS Management and Administration Building a Working Knowledge of Storage Networking Operations through a clear understanding of Solutions & Technology For professionals who are implementing and

Add to Reading List

Source URL: www.sniaindia.org

Language: English - Date: 2012-04-10 08:25:35
197Security / Cyberwarfare / Computer network security / Computer security / Crime prevention / National security / Cyber threat intelligence / Threat / SCADA

Leveraging Threat Intelligence in an Active Defense 2016 Erick Mandt Intelligence Analyst

Add to Reading List

Source URL: files.sans.org

Language: English - Date: 2016-07-11 10:53:35
198Distributed data storage / Computing / BitTorrent / Concurrent computing / Distributed computing / File sharing / Distributed hash table / Computer networking / Kademlia / Vuze / Chord / Pastry

IET Information Security Research Article Hijacking the Vuze BitTorrent network: all your hop are belong to us

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2016-06-28 22:06:38
199Wireless networking / Computing / Wireless / Technology / Wi-Fi / Wireless network / Laptop / Internet access / Wireless security / Home network

Town of Glastonbury – Welles-Turner Memorial Library Wireless Internet Access What is wireless? ™ Wireless Internet access uses radio frequency signals to exchange information between your computer and the Internet.

Add to Reading List

Source URL: wtmlib.com

Language: English - Date: 2012-10-15 10:02:05
200Computer security / Security / Computing / Computer network security / Crime prevention / Cryptography / National security / FireEye / Digital Guardian / Cloud computing security / Forcepoint / Threat

SCAWARDS2014_honor_Horizontal

Add to Reading List

Source URL: static.webvid.co.uk

Language: English - Date: 2016-06-09 13:10:01
UPDATE