Computer network security

Results: 18127



#Item
981White Paper  Automotive Security Best Practices Recommendations for security and privacy in the era of the next-generation car.

White Paper Automotive Security Best Practices Recommendations for security and privacy in the era of the next-generation car.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-09-13 23:40:35
982This toolkit will quickly point you to the resources you need to help you perform your role in Cybersecurity. Do you have a question about how to do something or need more information about a topic? Select a category bel

This toolkit will quickly point you to the resources you need to help you perform your role in Cybersecurity. Do you have a question about how to do something or need more information about a topic? Select a category bel

Add to Reading List

Source URL: www.delawareptac.org

Language: English - Date: 2015-10-09 08:58:30
983NDN, Technical Report NDN-0028, 2015. http://named-data.net/techreports.html Revision 1: January 27, ndnSIM 2.0: A new version of the NDN simulator

NDN, Technical Report NDN-0028, 2015. http://named-data.net/techreports.html Revision 1: January 27, ndnSIM 2.0: A new version of the NDN simulator

Add to Reading List

Source URL: named-data.net

Language: English - Date: 2015-02-03 17:01:51
984Security / Computing / Prevention / Computer security / Computer network security / Cryptography / E-commerce / Secure communication / Cross-site request forgery / SQL injection / Password / Salt

Application Security Checklist V1.0 Document Audience Application Developers

Add to Reading List

Source URL: www.security.uci.edu

Language: English - Date: 2016-02-23 10:01:01
985How Splashtop Helps Support HIPAA Compliance March 2015 Splashtop Inc.

How Splashtop Helps Support HIPAA Compliance March 2015 Splashtop Inc.

Add to Reading List

Source URL: d36wcsykcv5g5l.cloudfront.net

Language: English - Date: 2015-04-06 14:05:53
986Examining How the Great Firewall Discovers Hidden Circumvention Servers Roya Ensafi David Fifield

Examining How the Great Firewall Discovers Hidden Circumvention Servers Roya Ensafi David Fifield

Add to Reading List

Source URL: nymity.ch

Language: English - Date: 2015-09-09 09:56:25
987Foothill-De Anza Community College District Board of Trustees Board Policy Manual Computer and Network Use: Rights and Responsibilities

Foothill-De Anza Community College District Board of Trustees Board Policy Manual Computer and Network Use: Rights and Responsibilities

Add to Reading List

Source URL: ets.fhda.edu

Language: English - Date: 2015-03-12 18:57:54
988Research Brief March 2014 The Citizen Lab  Hacking Team’s US Nexus

Research Brief March 2014 The Citizen Lab Hacking Team’s US Nexus

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2015-03-18 14:57:24
989Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson,1 K. Asanovi´c,2 S. Dharmapurikar,3 J. Lockwood,4 R. Pang,5 R. Sommer,1 N. Weaver1 Abstract The performance pressures on implementing e

Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson,1 K. Asanovi´c,2 S. Dharmapurikar,3 J. Lockwood,4 R. Pang,5 R. Sommer,1 N. Weaver1 Abstract The performance pressures on implementing e

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:02
990VOLUME THREE · ISSUE TWO Secure Business Quarterly: Defining the Value of Strategic Security ILLUSTRATION: JUD GUITTEAU

VOLUME THREE · ISSUE TWO Secure Business Quarterly: Defining the Value of Strategic Security ILLUSTRATION: JUD GUITTEAU

Add to Reading List

Source URL: adam.shostack.org

Language: English - Date: 2014-06-11 12:01:38