Internet layer

Results: 1652



#Item
41A Brief Look at Cybersecurity May 14, 2015 Nate Gravel CISA, CISM, CRISC Director – Information Security Practice W. Jackson Schultz Security Consultant – Information Security Practice

A Brief Look at Cybersecurity May 14, 2015 Nate Gravel CISA, CISM, CRISC Director – Information Security Practice W. Jackson Schultz Security Consultant – Information Security Practice

Add to Reading List

Source URL: www.gravoc.com

Language: English - Date: 2015-05-20 14:24:44
42iRiS Logo Layer-Artboard Separated

iRiS Logo Layer-Artboard Separated

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English
43Network Working Group Request for Comments: 4346 Obsoletes: 2246 Category: Standards Track  T. Dierks

Network Working Group Request for Comments: 4346 Obsoletes: 2246 Category: Standards Track T. Dierks

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-02-04 15:25:49
44TLS 1.3: A Collision of Implementation, Standards, and Cryptography Eric Rescorla Mozilla

TLS 1.3: A Collision of Implementation, Standards, and Cryptography Eric Rescorla Mozilla

Add to Reading List

Source URL: www.cryptoexperts.com

Language: English - Date: 2016-05-30 09:49:30
45iRiS Logo Layer-Artboard Separated

iRiS Logo Layer-Artboard Separated

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English
46WebRTC School Qualified Developer (WSQD™) program Overview The WebRTC School™ is ‘the’ place to learn all about WebRTC, also known as Web Real-TimeCommunications. There is so much information on the internet abou

WebRTC School Qualified Developer (WSQD™) program Overview The WebRTC School™ is ‘the’ place to learn all about WebRTC, also known as Web Real-TimeCommunications. There is so much information on the internet abou

Add to Reading List

Source URL: www.thesipschool.com

Language: English - Date: 2015-03-14 20:06:45
47Informing Protocol Design Through Crowdsourcing: the Case of Pervasive Encryption Anna Maria Mandalari  Marcelo Bagnulo

Informing Protocol Design Through Crowdsourcing: the Case of Pervasive Encryption Anna Maria Mandalari Marcelo Bagnulo

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2015-10-29 00:54:14
48Presto: Edge-based Load Balancing for Fast Datacenter Networks Keqiang He† Eric Rozner∗ Wes Felter∗ John Carter∗ †

Presto: Edge-based Load Balancing for Fast Datacenter Networks Keqiang He† Eric Rozner∗ Wes Felter∗ John Carter∗ †

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2015-07-09 17:05:07
49Microsoft Word - IBSS&K Engineering.doc

Microsoft Word - IBSS&K Engineering.doc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-02-02 08:46:10
50Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer Christian Badertscher1, Christian Matt1, Ueli Maurer1, Phil Rogaway2, Björn Tackmann3 1ETH

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer Christian Badertscher1, Christian Matt1, Ueli Maurer1, Phil Rogaway2, Björn Tackmann3 1ETH

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24