Computer network security

Results: 18127



#Item
961Mano_Paul_Bookcover_Final

Mano_Paul_Bookcover_Final

Add to Reading List

Source URL: ristov.github.io

Language: English - Date: 2016-03-01 13:52:01
962White Paper  Financial Services Identity Management in an era of tell-all and technology overload Protect your most priceless assets under management: Your customers.

White Paper Financial Services Identity Management in an era of tell-all and technology overload Protect your most priceless assets under management: Your customers.

Add to Reading List

Source URL: lexisnexis.com

Language: English - Date: 2014-10-15 08:43:58
963Invensys  White Paper is now

Invensys White Paper is now

Add to Reading List

Source URL: iom.invensys.com

Language: English - Date: 2015-05-08 05:42:47
964Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu  ABSTRACT

Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACT

Add to Reading List

Source URL: vanbever.eu

Language: English - Date: 2014-10-08 09:38:20
965STANDARD EDITION Datasheet STANDARD EDITION AT A GLANCE A scan and analysis system for

STANDARD EDITION Datasheet STANDARD EDITION AT A GLANCE A scan and analysis system for

Add to Reading List

Source URL: www.palamida.com

Language: English - Date: 2015-06-17 16:42:29
966Microsoft PowerPoint - LinuxTag2008_Flyer_VPN_Solution.ppt

Microsoft PowerPoint - LinuxTag2008_Flyer_VPN_Solution.ppt

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2008-06-25 02:51:57
967INFORMATION TECHNOLOGY SERVICES Effective Date: May 5, 2015 Date Revised: May 5, 2015

INFORMATION TECHNOLOGY SERVICES Effective Date: May 5, 2015 Date Revised: May 5, 2015

Add to Reading List

Source URL: www.northeastern.edu

Language: English - Date: 2016-03-03 11:47:10
968AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks Seungwon Shin† †  Vinod Yegneswaran‡

AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks Seungwon Shin† † Vinod Yegneswaran‡

Add to Reading List

Source URL: www.openflowsec.org

Language: English - Date: 2013-10-15 15:03:15
969Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ron Rivest Handout 2 February 13, 2012

Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ron Rivest Handout 2 February 13, 2012

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English
    970HotSwap: Correct and Efficient Controller Upgrades for Software-Defined Networks Laurent Vanbever Joshua Reich

    HotSwap: Correct and Efficient Controller Upgrades for Software-Defined Networks Laurent Vanbever Joshua Reich

    Add to Reading List

    Source URL: www.vanbever.eu

    Language: English - Date: 2013-06-26 09:06:44