Computer network security

Results: 18127



#Item
871Computing / Internet / Network architecture / Secure communication / Internet Standards / Computer network security / Internet protocols / Internet security / SoftEther VPN / Tor / Transport Layer Security / HTTPS

Examining How the Great Firewall Discovers Hidden Circumvention Servers Roya Ensafi David Fifield

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2015-10-05 18:07:52
872Computing / Software / Network management / Scripting languages / Iptables / Computer network security / Event correlation / Firewall / Regular expression / Parsing / Complex event processing / Perl

Paper Title (use style: paper title)

Add to Reading List

Source URL: ristov.github.io

Language: English - Date: 2016-03-01 13:52:01
873Software / System software / Utility software / Computer network security / Intrusion detection systems / Wireless networking / Deep packet capture / Computer security / Snort / Packet analyzer / Suricata / Wireshark

Kernel packet capture technologies Éric Leblond Stamus Networks October 1, 2015

Add to Reading List

Source URL: home.regit.org

Language: English - Date: 2015-10-01 09:35:59
874Computer security / Cyberwarfare / Security / Computer network security / Cybercrime / Hacking / FireEye / Advanced persistent threat / Vulnerability / Phishing / Zero-day

FIREEYE AS A SERVICE IN ACTION: A Global, Coordinated Effort

Add to Reading List

Source URL: www.fireeye.de

Language: English - Date: 2016-02-10 18:53:46
875Software testing / Computing / Codenomicon / Technology / Security / Computer network security / Medical technology

Codenomicon-AppCheck-Symbol-Lock

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
876Security / Prevention / E-commerce / Carnegie Mellon University / Computer network security / Computer security / Cryptography / National security / BAE Systems / Computer emergency response team

e-Skills for Jobs 2015 THE IMPACT OF ICT ON EMPLOYMENT : Education, Jobs and Careers in the Digital Age turning e-Skills into jobs Riga, Latvia, 13 March 2015 Baiba Kaskina, CERT.LV

Add to Reading List

Source URL: eskillsforjobs.lv

Language: English - Date: 2015-03-15 17:08:30
877IPsec / Cryptographic protocols / Virtual private networks / Computer network security / Cryptographic software / StrongSwan / Internet Key Exchange / FreeS/WAN / Security association / Openswan

strongSwan VPNs scalable and modularized! Andreas Steffen Copyright © 2008 by Andreas Steffen

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2008-05-05 12:09:19
878Computing / Software / System software / Computer systems / Network management / Security / Log analysis / Login / Windows Security Log / Event Viewer / Password / Logfile

Critical Log Review Checklist for Security Incidents

Add to Reading List

Source URL: www.securitywarriorconsulting.com

Language: English - Date: 2010-03-23 02:04:48
879Computing / Cloud computing / Cloud infrastructure / Network file systems / Cloud computing security / Computer security / Cloud storage / Internet privacy / Cloud computing issues / IBM cloud computing

Cloudopsy: an Autopsy of Data Flows in the Cloud Angeliki Zavou1 , Vasilis Pappas1 , Vasileios P. Kemerlis1 , Michalis Polychronakis1 , Georgios Portokalidis2 , and Angelos D. Keromytis1 1

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2013-04-27 18:27:01
880Computer security / Computer network security / Insider threat / Threat / Intrusion detection system / Anomaly Detection at Multiple Scales / Insider trading / Insider / Malware / Cyber Insider Threat / Salvatore J. Stolfo

JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JANUARYBehavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2014-03-28 12:39:15
UPDATE