Computer network security

Results: 18127



#Item
61Computing / Internet Standards / Internet protocols / Directory services / Computer network security / Computer access control / RADIUS / NetIQ eDirectory / TACACS / Integrated Windows Authentication / Simple Network Management Protocol / Lightweight Directory Access Protocol

RadiusNT & RadiusX Dial-Up, VPN, Wireless & VOIP For Windows, Linux, FreeBSD and Solaris Version 5.1

Add to Reading List

Source URL: www.iea-software.com

Language: English - Date: 2013-02-14 00:20:40
62Computing / Software / Computer architecture / Computer network security / RADIUS / Apache HTTP Server / Windows / IEEE 802.1X / Zeroshell / 389 Directory Server

Air Marshal Authentication Gateway Version 1.0 IEA Software, Inc.

Add to Reading List

Source URL: www.iea-software.com

Language: English - Date: 2006-03-15 02:30:53
63Computer security / Security / Computer network security / Threat / Hunting / Vulnerability / Cyberwarfare

DFIR Threat Hunting Survey Results Preview

Add to Reading List

Source URL: files.sans.org

Language: English - Date: 2016-04-15 13:43:26
64Computing / Inter-process communication / Transmission Control Protocol / Remote procedure call / Ur / Network file systems / Computer network security

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYDistributed System Engineering: FallQuiz I

Add to Reading List

Source URL: nil.csail.mit.edu

Language: English - Date: 2015-01-05 06:37:34
65Computing / Hypertext Transfer Protocol / Session / World Wide Web / Invoice / Computer network security / Network architecture / Extensible Authentication Protocol

Frequently Asked Questions by Affiliates You will receive an authorization form for every client that has been approved to see you. As an affiliate, it is important that you not schedule any client without getting author

Add to Reading List

Source URL: secure.minesandassociates.com

Language: English - Date: 2013-08-06 16:42:27
66Computer network security / Computing / Security / Cyberwarfare / Bluetooth / Wireless / Medical device / Computer security / Man-in-the-middle attack / Bluesnarfing / Mobile security

Securing Legacy Mobile Medical Devices Vahab Pournaghshband, Majid Sarrafzadeh, and Peter Reiher Computer Science Department University of California, Los Angeles {vahab,majid,reiher}@cs.ucla.edu

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2012-09-17 16:56:34
67Security / Computer security / Cyberwarfare / Computer network security / Web applications / Cryptography / Secure communication / Vulnerability / Web application firewall / Application security / Application firewall

The Increasing Risk to Enterprise Applications Sponsored by Prevoty Independently conducted by Ponemon Institute LLC Publication Date: November 2015

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2016-08-18 22:09:36
68Computing / Security / Marketing / Remote desktop / CompTIA / Technical support / System administrator / Computer security / Operating system / Help desk / Information technology specialist / Bomgar

Computer Network Technician MK Hay Ranch Ltd., Quesnel, $54,000 - $60,000 The main duties: • Maintain, troubleshoot and administer the use of local area networks (LANs), wide area networks (WANs), mainframe networks, co

Add to Reading List

Source URL: www.aviaemployment.ca

Language: English - Date: 2016-08-08 16:18:19
69Computer security / Computing / Computer network security / Data security / Information Systems Security Association / OWASP / Minutes / Information

Capitol of Texas ISSA Chapter - Meeting Minutes December 17, :30 AM – 1:00 PM

Add to Reading List

Source URL: www.austinissa.org

Language: English - Date: 2015-01-05 12:38:38
70Cyberwarfare / Security / Computer security / Computer network security / Ambient intelligence / Internet of things / Intel Security / Malware / Wind River Systems / Eurotech

Press Release Embedded Software Security Solutions to Ride Rising Tide of Internet of Things, According to VDC Research Ubiquitous connectivity will drive 26% annual revenue growth for vendors to help thwart malware and

Add to Reading List

Source URL: www.vdcresearch.com

Language: English - Date: 2016-02-01 13:56:30
UPDATE