Network security

Results: 23614



#Item
951Computer network security / Computer security / Hacking / Software testing / Vulnerability / Application security / Web application firewall

Microsoft PowerPoint - VulnerabilityManagementInAnApplicaitonSecurityWorld_SnowFROC_20090305.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:46
952Network address translation / Internet protocols / Network protocols / Streaming / Web development / WebRTC / WebRTC Gateway / Real-time communication / Real-time Transport Protocol / Traversal Using Relays around NAT / STUN / Datagram Transport Layer Security

WebRTC School Qualified Integrator (WSQI™) program Overview The WebRTC School™ is ‘the’ place to learn all about WebRTC, also known as Web Real-TimeCommunications. There is so much information on the internet abo

Add to Reading List

Source URL: www.thesipschool.com

Language: English - Date: 2015-03-14 20:07:16
953Network architecture / Computer network security / Cryptographic protocols / Network protocols / Computer networking / 6WIND / Data Plane Development Kit / Open vSwitch / IPsec / Internet Key Exchange / Virtual private network / NAT traversal

TurboIPsec TM COTS Based IPsec VPN Solution With Scalable Performance

Add to Reading List

Source URL: www.6wind.com

Language: English - Date: 2016-07-25 19:28:57
954Internet Standards / Internet protocols / Routing protocols / Public-key cryptography / Computer networking / Resource Public Key Infrastructure / IP hijacking / Content delivery network / Border Gateway Protocol / Domain Name System Security Extensions / IP address / OpenDNS

RiPKI: The Tragic Story of RPKI Deployment in the Web Ecosystem Matthias Wählisch Robert Schmidt

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2015-10-23 03:22:22
955Hypertext Transfer Protocol / Cross-site request forgery / Internet privacy / JavaScript / Ajax / Computer network security / Same-origin policy / Cross-site scripting / HTTP cookie / Referer spoofing / Session fixation / XMLHttpRequest

Robust Defenses for Cross-Site Request Forgery Adam Barth Collin Jackson Stanford University

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2008-10-31 13:52:34
956Computer network security / Cybercrime / Computer security / Cryptography / Cyberwarfare / National security / Password / Email / Mobile computing / Internet / Server / Greek Orthodox Archdiocese of America

General Policy and Procedure on Technology Prepared by the Office of Information Technology AprilAdopted by Administrative Council June 7, 2010)

Add to Reading List

Source URL: www.arch-no.org

Language: English - Date: 2014-06-19 13:44:40
957Cloud infrastructure / Web hosting / System administration / Amazon Web Services / Network management / Sumo Logic / Amazon Virtual Private Cloud / Virtual private cloud / Cloud computing / Eucalyptus / Logicworks

WHITE PAPER Five AWS Practices Enhancing Cloud Security through Better Visibility

Add to Reading List

Source URL: www.sumologic.com

Language: English - Date: 2016-07-18 17:15:30
958Computer network security / Cyberwarfare / Computer security / Data security / Secure communication / Virtual firewall / Security / Firewall / Threat

Securing Your Digital Transformation Driving Digital Business Securely The only effective approach to security is a

Add to Reading List

Source URL: www.uk.logicalis.com

Language: English - Date: 2016-06-07 06:11:39
959Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
960Computer network security / Cyberwarfare / Denial-of-service attacks / Netfilter / Iptables / SYN cookies / Transmission Control Protocol / Denial-of-service attack / Tc / Firewall / SYN flood / Stateful firewall

DDoS protection Using Netfilter/iptables Jesper Dangaard Brouer Senior Kernel Engineer, Red Hat Network-Services-Team

Add to Reading List

Source URL: people.netfilter.org

Language: English - Date: 2014-02-08 09:46:20
UPDATE