Searched for: "principles of secure network design"
- Security (33)
- Mobility (10)
- Networking (8)
- Cxo (6)
- Microsoft (6)
- Enterprise Software (4)
- Tech & Work (4)
- Cloud (3)
- Open Source (3)
- After Hours (2)
- Data Management (2)
- Developer (2)
- Software (2)
- Collaboration (1)
- Hardware (1)
- Innovation (1)
- Project Management (1)
- Social Enterprise (1)
- Start-Ups (1)
- Storage (1)
About 93 results for "principles of secure network design"
Rapid change is part of the modern day IT department, but some companies are focused more on long-term projects than short-term change. Take Tech Pro Research's survey on fast IT a...
From recovering seawater-immersed media to providing security to SMBs, learn how three IT consultants in Florida (two of whom are former NSA employees) are helping clients and stud...
In this paper, the authors demonstrate and outlines the practical implementation of a secure cloud storage solution for Small and Medium-sized Enterprises (SMEs) by example of an A...
One of the principal challenges of resource sharing on data communication network is its security. This paper presents a design of data encryption and decryption using RSA algorith...
The principle goal is secure blueprint for enterprise networks is to provide best practice information to interested parties on designing and implementing secure networks. SAFE ser...
Near-Field Communication (NFC) is a short range wireless communication technology, which operates in the principle of magnetic induction. A small electric current is created by a r...
To face this problem, the authors propose a truthful routing protocol which adopts the routing principle to cope with the network dimensions, and relies on a distributed trust mode...
Efficient defense against security attacks is a challenging task in the wireless sensor network and offering security guarantees becomes an important requirement in the design of t...
In cryptography, the Advanced Encryption Standard (AES) is one of the most popular algorithms used in symmetric key cryptography. It is available in many different encryption packa...
A recent field of study is the security of the information over public network through encryption in efficient way. Even if there are no efficiency gains to be made, there are prac...