Network Security Toolkit

Results: 52



#Item
11Network architecture / System software / Identity management systems / GridFTP / Identity management / Security Assertion Markup Language / Internet standards / PERMIS / Voms / Computing / Grid computing / FTP

Communicating Security Assertions over the GridFTP Control Channel Rajkumar Kettimuthu1,2, Liu Wantao3,4, Frank Siebenlist1,2, and Ian Foster1,2,3 1 Mathematics and Computer Science Division, Argonne National Laboratory

Add to Reading List

Source URL: toolkit.globus.org

Language: English - Date: 2008-10-27 13:50:24
12RADIUS / Internet / Windows Server / Server / Network architecture / Computer network security / Internet Authentication Service / Computing / Internet protocols / Internet standards

RADIUS Software Developer’s Toolkit – v7.3 Interlink Networks’ RADIUS Software Developer’s Toolkit provides a set of easy-toimplement and modular tools to help you extend the capabilities of your Interlink Networ

Add to Reading List

Source URL: www.interlinknetworks.com

Language: English - Date: 2012-02-18 13:53:24
13Computer network security / Ntop / Pcap / Netflow / Packet Processing / Packet capture / Deep packet inspection / Packet loss / Network Security Toolkit / Software / System software / Computing

ntop Network monitoring solutions Who is nTop !

Add to Reading List

Source URL: www.ntop.org

Language: English - Date: 2014-05-03 03:06:10
14Multi-agent systems / Botnets / Cyberwarfare / Denial-of-service attacks / Fast flux / Denial-of-service attack / International Telecommunication Union / Storm Worm / Zombie / Computer network security / Computing / Spamming

Microsoft Word - itu-botnet-mitigation-toolkit-background-revised-22-january-2008.doc

Add to Reading List

Source URL: www.itu.int

Language: English - Date: 2008-01-23 05:56:04
15Ntop / Pcap / PF / Packet capture / Packet loss / GTK+ / Packetsquare / Network Security Toolkit / Software / System software / Computer network security

nBox Recorder High-speed network packet recording system Modern data networks keep growing and growing in terms of speed. In a few years data throughput increased from 100 Mbit/s to

Add to Reading List

Source URL: www.ntop.org

Language: English - Date: 2014-05-03 03:06:25
16Computer network security / System software / Software testing / Digital forensics / Drexel University / Eastern Pennsylvania Rugby Union / Forensic Toolkit / EnCase / Penetration test / Computer security / Computing / Computer forensics

Cindy Casey th 201 South 18 Street, Apt. 620 Philadelphia, PA[removed]2320 [removed]

Add to Reading List

Source URL: www.htcia.org

Language: English - Date: 2015-03-10 13:35:57
17Network File System / Access control list / Voms / Replication / Grid Security Infrastructure / Globus Toolkit / GridFTP / Linux kernel / Generic Security Services Application Program Interface / Computing / Computer architecture / Grid computing

FINAL REPORT SCI: NMI DEVELOPMENT: GridNFS National Science Foundation Grant SCI[removed]Abstract This report provides an overview of the GridNFS project, details project accomplishments, reports on current

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2008-08-02 00:08:42
18Computer network security / Access control / Privilege / Superuser / Capability-based security / Threat / Operating system / Ring / Kernel / Computer security / Security / Cyberwarfare

In Foundations of Data Organization, eds. W. Litwin and H.-J. Shek. Springer, 1990, pp[removed]Preprint) ITOSS: An Integrated Toolkit For Operating System Security.1 (Extended Abstract) Michael Rabin

Add to Reading List

Source URL: tygar.net

Language: English - Date: 2006-03-31 18:45:08
19Computer network security / System administration / Privilege / Operating system / Superuser / Ring / Kernel / Vulnerability / Threat / Computer security / Cyberwarfare / Security

Harvard University Aiken Computation Laboratory technical report TR-05-87R An Integrated Toolkit for Operating System Security Michael O. Rabin and J. D. Tygar1 Aiken Computation Laboratory

Add to Reading List

Source URL: tygar.net

Language: English - Date: 2006-03-31 18:45:11
20Crime prevention / National security / Computer network security / Operating system / Unix / Vulnerability / Capability-based security / Physical security / X Window System / Security / Computer security / Public safety

J. D. Tygar, Ph.D. dissertation, Harvard University An Integrated Toolkit for Operating System Security A thesis presented by

Add to Reading List

Source URL: tygar.net

Language: English - Date: 2006-03-31 18:45:01
UPDATE