1
Published 2022
Springer International Publishing

2
by Calcote, Lee, Butcher, Zack
Published 2020
O'Reilly Media

3
by Rountree, Derrick
Published 2013
Syngress Media Inc.
Table of Contents: ... -- chapter 4. Secure remote access -- chapter 5. Internet connection security -- chapter 6. Network...

4
Published 2020
Springer International Publishing
Table of Contents: ...: Counteracting Eviction-Based Cache Side-Channel Attacks through Indirect Eviction -- Connection Security...

5
by Asselin, Stephane
Published 2014
VMware Press

6
Published 2019
Springer International Publishing
Table of Contents: ... Statistical Model Checking of UAV Flight plan -- Only Connect, Securely -- Output-sensitive Information Flow...

7
by Alexander, Perry
Published 2007
Elsevier
...-offs for power consumption, security requirements in a networking environment, and constraints...

8
Published 2008
Syngress
Table of Contents: ... Traffic Filtering; Firewall Rules; Connection Security Rules; Firewall Profiles...

9
Published 2016
Springer International Publishing
Table of Contents: ... of the Metropolitan Area of Barcelona -- User Behavior Modeling for Estimating Residential Energy Consumption...

10
by Quevedo, Waldemar
Published 2018
Apress
Table of Contents: ...; Connecting Securely to NATS; Configuring TLS in the Server; Securing the Monitoring Endpoint; Tuning...

11
by Sanderson, Dan
Published 2009
O'Reilly Media, Inc.
Table of Contents: ... files in Java; Secure Connections; Secure connections in Python...

12
by Sanderson, Dan
Published 2015
O'Reilly
Table of Contents: ... Files; MIME Types; Cache Expiration; Domain Names; Google Apps; Configuring Secure Connections; Secure...

13
by Brinkhoff, Christiaan, Patnaik, Sandeep, Pedholt, Morten
Published 2023
Packt Publishing, Limited
Table of Contents: ... deployment and security -- User profiles -- Networking dataflow -- Connection security -- Required URLs...

14
by Behringer, Michael H.
Published 2005
Cisco
Table of Contents: ... -- PE Data Plane Security -- PE-CE Connectivity Security Issues -- P-Specific Router Security...

15
by Alibi, Mohamed, Roy, Bhaskarjyoti
Published 2016
Packt Publishing
Table of Contents: ... and Tools; SSH for remote connection; Securing SSH and the root login configuration; SSH key-based...

16
by Vugt, Sander van
Published 2013
Packt Publishing
Table of Contents: ... options; Automatic snapshots; Time synchronization; VNC Connections; Securing virtual machines; Summary...

17
by Priyam, Prashant
Published 2018
Packt Publishing
Table of Contents: ... connections -- Security best practices for AWS RDS -- Back up and restore database -- Monitoring of RDS -- AWS...

18
by Ruan, Xiaoyu
Published 2014
Apress, Distributed to the Book trade worldwide by Springer
Table of Contents: ... -- Internet Connectivity -- Security -- BYOD -- Incident Case Study -- eBay Data Breach -- Target Data Breach...

19
Published 1986
Springer Netherlands
Table of Contents: ... Connections Secured by Locknuts -- 16. Redesign and Development of a Force Transducer of the Buckle Type -- 17...

20
by Murray, Daniel G.
Published 2013
J. Wiley & Sons
Table of Contents: ... Consumption -- Security Considerations for Mobile Consumption -- Typical Mobile Usage Patterns -- Using...