and Security Technologies

Results: 1110



#Item
381Computer network security / Akamai Technologies / Content delivery network / Application firewall / Network performance / Denial-of-service attack / Load balancing / DNS spoofing / Anycast / Computing / Internet / Network architecture

White Paper Akamai Security Capabilities: Protecting Your Online Channels and Web Applications Table of Contents

Add to Reading List

Source URL: www.akamai.de

Language: English - Date: 2012-01-25 15:24:03
382Information technology / Communication / Educational technology / Information and communication technologies in education

NETWORK SECURITY “Empowerment Through Education and Training” ICA60211  ADVANCED DIPLOMA OF

Add to Reading List

Source URL: www.acbc.nsw.edu.au

Language: English - Date: 2014-02-27 01:00:14
383Economy of the United States / Technology / United Technologies Corporation / UTC Fire & Security / Pratt & Whitney

DEAR SHAREOWNER United Technologies delivered another strong performance in 2013, with double-digit earnings growth despite a weaker-than-expected economic recovery. The success of our portfolio transformation and our co

Add to Reading List

Source URL: 2013ar.utc.com

Language: English - Date: 2014-03-19 15:04:52
384Information technology / Cognos Reportnet / Data management / IBM software / Online analytical processing / Cognos / Application server / IBM / IBM Cognos 8 Business Intelligence / Business intelligence / Business / Computing

genware audit processor The Genware Audit Processor™ provides advanced usage, usability, administrative, and security information for IBM® Cognos® Application Server Technologies. Application Management

Add to Reading List

Source URL: www.genwarecs.com

Language: English - Date: 2014-09-12 09:52:26
385Cisco Systems / Deep packet inspection / Videotelephony / NetAid / Cisco PIX / Cisco IOS / Cisco Catalyst / Load balancing / Akamai Technologies / Computing / System software / Computer network security

W HITE P APER The Network Architecture Behind NetAid NetAid was developed by Cisco Systems and the United Nations Development Program (UNDP) to help end extreme poverty. Confronting the reality that more than a billion

Add to Reading List

Source URL: www.cisco.com

Language: English - Date: 2000-03-10 18:57:30
386Network service / Domain name system

Press Release EfficientIP expands global channel network with ChuanhowTech to bring innovative DDI technologies and DNS security to Taiwan • • •

Add to Reading List

Source URL: www.efficientip.com

Language: English - Date: 2014-10-01 07:58:54
387Antivirus software / System software / Spam filtering / Email / GFI Software / Web threat / Malware / Phishing / Anti-spam techniques / Computing / Internet / Spamming

GFI White Paper Web-based security threats: how attacks have shifted and what to do about it As email and web technologies converge, the number of security

Add to Reading List

Source URL: www.gfi.com

Language: English - Date: 2011-06-05 05:37:12
388Computing / Software testing / National security / Application security / Core Security Technologies / Vulnerability / OWASP / Voice over IP / Web application security / Computer network security / Security / Computer security

Conference Kit Version 2.0 * Over 30 Network Security Specialists and Researchers * 7-tracks of Hands on Technical Training Sessions * Network Assessment and Latest Attack Methods

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:50:30
389Computing / Public-key cryptography / Email / PGP / Pretty Good Privacy / ID-based encryption / Hushmail / Internet security / Secure communication / Cryptography / Internet privacy / Internet

REPRINT Ed Gerck: “Secure Email Technologies X[removed]PKI, PGP, IBE, and ZMAIL”, in Chapter 12, Corporate Email Management, S. J. Krishna and Elizabeth Raju (Ed.), ICFAI University Press, 2007, pp[removed], ISBN 81-31

Add to Reading List

Source URL: nma.com

Language: English - Date: 2009-01-09 03:09:23
390Cyberwarfare / Computer network security / Internet privacy / Security token / SecurID / Virtual private network / RSA / Dynamic SSL / Layered security / Cryptography / EMC Corporation / Computer security

Emerging Technologies and Associated Security Solutions in Financial Networks Larry Suto Consulting Security Strategist

Add to Reading List

Source URL: nma.com

Language: English - Date: 2002-10-05 05:05:16
UPDATE