Computer network security

Results: 18127



#Item
971Technology / Security / E-commerce / Computer network security / Internet / New media / Telegraphy / Computer security / Windows 10 / User guide / Operating system

eGrants System Applicant User Guide Nevada Traffic Safety eGrants System Applicant User Guide

Add to Reading List

Source URL: egrants.nv.gov

Language: English - Date: 2015-01-31 09:12:09
972Computing / Cyberwarfare / World Wide Web / Web hosting / Cybercrime / Computer network security / Data management / Phishing / SQL injection / Web hosting service / Internet bot / Computer security

The Role of Web Hosting Providers in Detecting Compromised Websites Davide Canali Davide Balzarotti

Add to Reading List

Source URL: www2013.wwwconference.org

Language: English - Date: 2014-07-21 08:47:06
973

CyberCIEGE Can you keep the network alive? A Computer Network Security Video Game I want my Internet!

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2007-11-15 12:21:18
    974Computing / Cyberwarfare / Computer security / Palamida / Hacking / Computer network security / Software testing / ASP.NET / Shellshock / Vulnerability

    ENTERPRISE EDITION Datasheet ENTERPRISE EDITION AT A GLANCE An end-to-end system for

    Add to Reading List

    Source URL: www.palamida.com

    Language: English - Date: 2015-06-17 16:42:29
    975Computer network security / Multipath TCP / Transmission Control Protocol / Cyberwarfare / Network address translation / Network performance / Transport layer / Firewall / TCP offload engine / TCP reset attack

    A first look at real Multipath TCP traffic B. Hesmans, H. Tran-Viet, R. Sadre, O. Bonaventure ICTEAM, Universit´e catholique de Louvain, Louvain-la-Neuve, Belgium Abstract. Multipath TCP is a new TCP extension that attr

    Add to Reading List

    Source URL: inl.info.ucl.ac.be

    Language: English - Date: 2016-03-04 17:10:41
    976Computer network security / Identity theft / Rogue software / National security / ShmooCon / Spyware / Computer security / Sendmail / Stack

    Towards Evidence-Based Security Adam Shostack ShmooCon ‘05 Slides at

    Add to Reading List

    Source URL: adam.shostack.org

    Language: English - Date: 2014-06-11 11:48:53
    977Security / Espionage / Cyberwarfare / Computer network security / Military intelligence / Threat / Computer security / Draft:Threat Intelligence Analyst / Threat Intelligence Platform

    AbuseSA Frequently Asked Questions AbuseSA is the cornerstone to an intelligence-driven strategy strategy to help governments and CERTs to rapidly respond to abusive activity. The situational awareness solution provides

    Add to Reading List

    Source URL: www.codenomicon.com

    Language: English - Date: 2016-03-02 04:58:14
    978

    Network Security of Internet Services: Eliminate DDoS Reflection Amplification Attacks Todd Booth1∗ and Karl Andersson2 Division of Computer Science, Lule˚a University of Technology, Sweden 1 Information Systems 2 Per

    Add to Reading List

    Source URL: isyou.info

    Language: English - Date: 2015-08-26 21:22:47
      979Security / Computer security / Software testing / Cyberwarfare / Codenomicon / Computer network security / Cyber-attack

      Codenomicon-AppCheck-Symbol-Lock

      Add to Reading List

      Source URL: www.codenomicon.com

      Language: English - Date: 2016-03-02 04:58:12
      980Network architecture / Computer network security / OpenFlow / Software-defined networking / Stateful firewall / Open vSwitch / Firewall / Controller

      HotSwap: Correct and Efficient Controller Upgrades for Software-Defined Networks Laurent Vanbever Joshua Reich

      Add to Reading List

      Source URL: vanbever.eu

      Language: English - Date: 2013-06-26 09:06:44
      UPDATE