Network layer

Results: 1811



#Item
61Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Certificate policy / Certificate authority / Revocation list / Public key certificate / X.509 / Authentication / Energy Sciences Network

DOE Grids Certificate Policy And Certification Practice Statement Version 2.9

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2006-12-15 16:35:48
62Computer network security / Computing / Computer security / Cyberwarfare / Layer 2 Tunneling Protocol / DMZ / Virtual private network / Network switch / Secure Computing Corporation / Firewall

Secure Computing SnapGear™ User Manual Secure Computing 4810 Harwood Road San Jose, CA

Add to Reading List

Source URL: go.mcafee.com

Language: English - Date: 2006-08-31 03:33:18
63Network performance / Computing / Network management / Network architecture / TCP congestion control / Transmission Control Protocol / Elephant flow / Bandwidth-delay product / Transport layer / Robust random early detection / Throughput / Additive increase/multiplicative decrease

Adaptive Data Transmission in the Cloud Wenfei Wu ∗ , Yizheng Chen ∗ , Ramakrishnan Durairajan ∗ , Dongchan Kim ∗ , Ashok Anand ∗ ∗

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2013-06-11 12:23:00
64Computing / Network architecture / Technology / Internet Protocol / Telecommunications engineering / Cultural globalization / Internet / New media / Link layer / Communications protocol / Transmission Control Protocol / Internet protocol suite

Olaf Kolkman Seoul,16 June 2008 Internet Technical Community Forum The Hourglass:

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:06:52
65Computing / Network architecture / World Wide Web / Internet protocols / SPDY / HTTP/2 / CRIME / Play Framework / Push technology / QUIC / Hypertext Transfer Protocol / Application-Layer Protocol Negotiation

Is The Web HTTP/2 Yet? http://isthewebhttp2yet.com/ Matteo Varvello1 , Kyle Schomp2 , David Naylor3 , Jeremy Blackburn1 , Alessandro Finamore1 , and Konstantina Papagiannaki1 Telef´onica Research1 , Case Western Reserve

Add to Reading List

Source URL: isthewebhttp2yet.com

Language: English - Date: 2016-05-14 14:29:23
66Computing / Internet / E-commerce / Internet security / Secure communication / Transport Layer Security / Server / Network architecture

Jarrett & Lam Limited The Laurels, 75 Reigate Road, Hookwood, Surrey RH6 0HL www.jarrettandlam.com Terms and Conditions for operating Vacancy Lab on a cloud server or over the internet.

Add to Reading List

Source URL: www.vacancylab.com

Language: English - Date: 2015-12-18 09:30:09
67Computing / Network architecture / OSI protocols / Computer networking / Routing / Internet Standards / Internet protocol suite / OSI model / Router / Computer network / Communications protocol / Data link layer

Keith Douglas Statistics Canada1 Title: “Prolegomena to any Future Metaphysics of Networking” Abstract: The hierarchical nature of both Mario Bunge’s metaphysics and the OSI model of co

Add to Reading List

Source URL: philosopher-animal.com

Language: English - Date: 2009-06-21 11:50:57
68Software / Graphics software / Communication design / Digital photography / Image processing / Graphic design / Transmission Control Protocol / Layers / Network switch / Adobe Photoshop / Network architecture

Are there times when you struggle to see what is on a particular layer in a Photoshop document? Do you wish there was a way to have the thumbnails larger in size? Well, there is! There are, in fact, 2 changes we can make

Add to Reading List

Source URL: snickerdoodledesignsbykaren.com

Language: English - Date: 2015-12-11 11:24:17
69Software / Computing / Cyberwarfare / Computer network security / Internet Standards / Multi-agent systems / Spamming / Transmission Control Protocol / Skype / Botnet / Transport Layer Security / Network packet

Two Methods for Detecting Malware Maciej Korczyński, Gilles Berger-Sabbatel, and Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory UMR, rue de la Passerelle, BPSaint

Add to Reading List

Source URL: mkorczynski.com

Language: English - Date: 2015-02-15 17:10:50
70Computing / Network architecture / Internet protocols / Secure communication / World Wide Web / Computer networking / Transport Layer Security / QUIC / Proxy server / SPDY / HTTPS / Hypertext Transfer Protocol

The Cost of the “S” in HTTPS David Naylor? , Alessandro Finamore† , Ilias Leontiadis‡ , Yan Grunenberger‡ , Marco Mellia† , Maurizio Munafò† , Konstantina Papagiannaki‡ , and Peter Steenkiste? ? Carnegi

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:56:14
UPDATE