Transmission security

Results: 1396



#Item
121Crime prevention / Water transport / Surveillance / Automatic Identification System / Warning systems / Closed-circuit television / Security / National security / Public safety

Offshore Cable Surveillance Product Sheet Protection of critical cable infrastructure Subsea transmission cables are increasingly becoming critical infrastructure. Subsea telecommunication cables constitute a backbone of

Add to Reading List

Source URL: gatehouse2013.net.dynamicweb-cms.com

Language: English - Date: 2013-03-06 11:56:06
122Electric power transmission systems / Electric power distribution / Electrical engineering / Monopoly / Smart grid / Electrical grid / Electric power transmission / Demand response / Sustainable energy / Electric power / Energy / Electromagnetism

Chapter II: Increasing the Resilience, Reliability, Safety, and Asset Security of TS&D InfrastructureQER Report: Energy Transmission, Storage, and Distribution Infrastructure | April 2015

Add to Reading List

Source URL: energy.gov

Language: English - Date: 2015-04-27 17:55:15
123Internet / Cryptographic software / Transmission Control Protocol / Packet switching / Internet Protocol / Packet Processing / Anonymity / Degree of anonymity / Tor / Computer networking / Computing / Internet privacy

LAP: Lightweight Anonymity and Privacy

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2012-05-22 01:35:47
124Computing / Internet Assigned Numbers Authority / Domain Name System Security Extensions / Request for Comments / Internet Draft / Internet Engineering Steering Group / Internet Engineering Task Force / Transmission Control Protocol / Internet / Internet standards / Internet governance

IANA Plenary Report Michelle Cotton Manager, IANA Services ICANN July 2012 IETF-84, Vancouver

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2013-04-23 17:49:34
125Computer network security / Network performance / Internet / Data transmission / Proxy server / Web browsers / Open proxy / Computer networking / Computing / Internet privacy

AUH RA USE OF PROXY AUHRA GUIDE This guide contains a quick guide and a more detailed guide for managers on how to appoint proxies in AUHRA. This will usually be relevant when a manager and his or her secretary are

Add to Reading List

Source URL: medarbejdere.au.dk

Language: English - Date: 2013-09-02 05:27:14
126Internet / Networking hardware / Cyberwarfare / Computer networking / Videotelephony / Router / Transmission Control Protocol / Firewall / Internet protocol suite / Computing / Computer network security / Network architecture

For Your Eyes Only: Protecting Data-in-Motion ™ with Dispersive Virtualized Networks

Add to Reading List

Source URL: dispersivetechnologies.com

Language: English - Date: 2015-04-29 15:03:25
127Internet / Network address translation / Middlebox / Application-level gateway / Internet Architecture Board / IP address / Port / Firewall / Transmission Control Protocol / Computer network security / Network architecture / Computing

Network Working Group Request for Comments: 3424 Category: Informational L. Daigle, Ed. Internet Architecture Board

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2002-11-18 13:47:46
128Network address translation / Computer network security / TCP/IP stack fingerprinting / IPv4 / IP address / Private network / Transmission Control Protocol / Network protocols / Network architecture / Internet / Computing

2014 IEEE Security and Privacy Workshops Can we identify NAT behavior by analyzing Traffic Flows? YaseminGokcen

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-30 03:11:08
129X86 assembly language / Accumulator / Transmission Control Protocol / X86-64 / Checksum / MOV / Ping / X86 / Spinlock / Computer architecture / Computing / X86 architecture

New Results for Timing-Based Attestation

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2012-05-22 01:34:12
130Energy conversion / Energy development / Energy economics / Energy in Africa / Desertec / Super grid / Solar power / Solar thermal energy / Electric power transmission / Energy / Technology / Electric power transmission systems

DESERTEC: security of energy supplies1 Gerry Wolff November 2009 There are many reasons why the DESERTEC proposals would provide good security of energy supplies: •

Add to Reading List

Source URL: www.desertec-uk.org.uk

Language: English - Date: 2009-11-06 04:45:08
UPDATE