Computer network security

Results: 18127



#Item
71Computing / Computer access control / Computer security / Identity management systems / Identity management / Federated identity / ForgeRock / Cloud standards / Computer network security / User-Managed Access / Customer engagement / Provisioning

Why Financial Services Choose ForgeRock What We Do IMPROVE CUSTOMER EXPERIENCE

Add to Reading List

Source URL: www.forgerock.com

Language: English - Date: 2016-08-11 01:02:02
72Computing / Spamming / Cyberspace / Multi-agent systems / Computer network security / Botnets / Cybercrime / Email spam / Anti-spam techniques / Bagle / Email / Computer virus

DRSA MessageLabs Intelligence: March 2006 Introduction Welcome to the March edition of the MessageLabs Intelligence monthly report. This report provides the latest

Add to Reading List

Source URL: londonactionplan.org

Language: English - Date: 2016-04-26 15:59:10
73Information privacy / Economy / Payment cards / Computing / E-commerce / Information / Cryptography / Computer law / Payment Card Industry Data Security Standard / Information security / Data security / Network segmentation

Microsoft Word - PCI DSS Information Security Policy (v2016.1)

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:18:12
74Software / System software / Computer architecture / Disk file systems / Network file systems / File system / ZFS / Tar / XFS / Capability-based security / Filesystem in Userspace / Data

Hierarchical File Systems are Dead Margo Seltzer, Nicholas Murphy Harvard School of Engineering and Applied Sciences Abstract

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2009-04-29 19:50:23
75Security / Computing / Cyberwarfare / Computer security / Computer network security / Cryptography / National security / Denial-of-service attack / Threat / Critical infrastructure protection / Internet / Vulnerability

An ideal Internet Early Warning System Dominique Petersen and Norbert Pohlmann Institute for Internet Security University of Applied Sciences Gelsenkirchen {petersen, pohlmann}@internet-sicherheit.de Abstract

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 12:57:45
76Security / Education / Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Secure communication / University of Birmingham / Gisbert Kapp / Lecture

University of Birmingham Computer Science MSc Cyber Security Semester Two

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2016-01-12 06:53:34
77Security / Data management / Computing / Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Data / Computer emergency response team / Search engine indexing

Data Mining in Incident Response Challenges and Opportunities Alexandre Dulaunoy TLP:WHITE Information Security Education

Add to Reading List

Source URL: www.circl.lu

Language: English - Date: 2016-08-11 10:49:35
78Computing / Security / Computer network security / Cybercrime / Data security / Computer security / Cryptography / Secure communication / Cloud computing / Multi-factor authentication / De-perimeterisation

Two Factor Authentication: Security in an Age of Zero Trust Jon Oberheide, CTO, Duo Security Not-so-surprising trends  Cloud

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-18 22:20:40
79Computer security / Cyberwarfare / Security / Computer network security / Hacking / Cybercrime / Advanced persistent threat / Espionage / Trend Micro / Zero-day / Targeted threat / Internet security

Detecting the Enemy Inside the Network: How tough is it to Deal with APTs?

Add to Reading List

Source URL: about-threats.trendmicro.com

Language: English - Date: 2013-04-19 02:52:06
80Computing / Security / Secure communication / Cyberwarfare / Computer security / Information privacy / Human rights / Data protection / Internet privacy / Privacy / Data mining / Internet security

Large-Scale Collection and Sanitization of Network Security Data: Risks and Challenges∗ (position paper) Phillip Porras Vitaly Shmatikov

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2006-07-31 13:42:23
UPDATE