Computer network security

Results: 18127



#Item
941Talking to Strangers Without Taking Their Candy: Isolating Proxied Content Adrienne Felt, Pieter Hooimeijer, David Evans, Westley Weimer University of Virginia {felt, pieter, evans, weimer}@cs.virginia.edu

Talking to Strangers Without Taking Their Candy: Isolating Proxied Content Adrienne Felt, Pieter Hooimeijer, David Evans, Westley Weimer University of Virginia {felt, pieter, evans, weimer}@cs.virginia.edu

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2008-03-19 15:40:17
942Die strongSwan Open Source VPN Lösung Open Source Trend Days 2013 Steinfurt www.strongswan.org

Die strongSwan Open Source VPN Lösung Open Source Trend Days 2013 Steinfurt www.strongswan.org

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2013-09-25 06:25:19
943Microsoft Word - UTSI VPN Connection.docx

Microsoft Word - UTSI VPN Connection.docx

Add to Reading List

Source URL: cs.utsi.edu

Language: English - Date: 2013-10-03 17:02:20
944EINE Easy Internet vpN Extender Large-scale plug&play x86 network appliance deployment over Internet Olivier COCHARD-LABBÉ

EINE Easy Internet vpN Extender Large-scale plug&play x86 network appliance deployment over Internet Olivier COCHARD-LABBÉ

Add to Reading List

Source URL: www.bsdcan.org

Language: English - Date: 2015-11-20 12:50:18
945ISSE/2015/Press releases/Dr Emma Philpott FINAL: 10th August 2015 Dr Emma Philpott to Engage Small Companies in Cyber Security at Information Security Solutions Europe 2015 ISSE 2015 takes place 10th and 11th November 20

ISSE/2015/Press releases/Dr Emma Philpott FINAL: 10th August 2015 Dr Emma Philpott to Engage Small Companies in Cyber Security at Information Security Solutions Europe 2015 ISSE 2015 takes place 10th and 11th November 20

Add to Reading List

Source URL: www.isse.eu.com

Language: English - Date: 2015-08-14 05:29:14
946Modeling in 12 Threat EPC-Based Information Sharing Networks Alexander Ilic, Trevor Burbridge, Andrea Soppera, Florian Michahelles, and Elgar Fleisch

Modeling in 12 Threat EPC-Based Information Sharing Networks Alexander Ilic, Trevor Burbridge, Andrea Soppera, Florian Michahelles, and Elgar Fleisch

Add to Reading List

Source URL: cocoa.ethz.ch

Language: English - Date: 2013-05-23 02:06:52
947Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention Jose M Gonzalez Vern Paxson

Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention Jose M Gonzalez Vern Paxson

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:08
948Design of a blocking-resistant anonymity system Roger Dingledine and Nick Mathewson , Tor Tech ReportNovember 2006

Design of a blocking-resistant anonymity system Roger Dingledine and Nick Mathewson , Tor Tech ReportNovember 2006

Add to Reading List

Source URL: research.torproject.org

Language: English - Date: 2012-08-31 06:11:24
949A Security Enforcement Kernel for OpenFlow Networks Phillip Porras† Seungwon Shin‡ Vinod Yegneswaran† Martin Fong† Mabry Tyson† Guofei Gu‡ †  SRI International

A Security Enforcement Kernel for OpenFlow Networks Phillip Porras† Seungwon Shin‡ Vinod Yegneswaran† Martin Fong† Mabry Tyson† Guofei Gu‡ † SRI International

Add to Reading List

Source URL: www.openflowsec.org

Language: English - Date: 2013-10-15 15:03:15
950The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment Andreas Steffen ITA Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil CH-8640 Rapper

The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment Andreas Steffen ITA Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil CH-8640 Rapper

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2012-08-29 15:32:53