Application firewall

Results: 701



#Item
121Cyberwarfare / Imperva / Database activity monitoring / Cloud computing / Application firewall / Microsoft SharePoint / Threat / Vormetric / Database security / Computer network security / Computing / Computer security

File Protecting the Data That Drives Business® File Security Audit and Protect Unstructured Data Cutting edge Imperva SecureSphere File Security products:

Add to Reading List

Source URL: www.edvance.com.hk

Language: English - Date: 2012-05-04 00:16:19
122Cyberwarfare / Dual-homed / Bastion host / Firewall / DMZ / Proxy server / Telnet / Application firewall / Distributed firewall / Computer network security / Computing / Computer security

tis TIS Firewall Toolkit Overview About The Toolkit and This Documentation The TIS Firewall Toolkit (hereafter referred to as “the toolkit”) is a set of programs and configuration practices designed to facilitate the

Add to Reading List

Source URL: www.fwtk.org

Language: English - Date: 2015-05-17 11:35:16
123Networking hardware / Middlebox / Firewall / Packet Processing / Application firewall / Load balancing / Packet switching / Transmission Control Protocol / Multi-core processor / Computing / Computer network security / Computer networking

Design and Implementation of a Consolidated Middlebox Architecture Vyas Sekar∗ , Norbert Egi†† , Sylvia Ratnasamy† , Michael K. Reiter? , Guangyu Shi †† ∗ Intel Labs, † UC Berkeley, ? UNC Chapel Hill, †

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2012-11-27 06:23:17
124Internet / Cyberoam / Wireless security / Unified threat management / Virtual private network / Application firewall / Stateful firewall / Layer 2 Tunneling Protocol / IPsec / Computer network security / Computing / Network architecture

Cyberoam CR25wiNG Datasheet

Add to Reading List

Source URL: www.cyberoam.com

Language: English - Date: 2015-02-05 05:42:43
125Security / Cloud computing / Computer network security / Antivirus software / VM / Application firewall / Computer virus / Computer security / System software / Computing

Computer Science DACSA: A Decoupled Architecture for Cloud Security Analysis Jason Gionta, William Enck, Peng Ning – NC State

Add to Reading List

Source URL: gionta.org

Language: English - Date: 2014-12-11 10:21:08
126Internet / Cyberoam / Unified threat management / Security appliance / Application firewall / Stateful firewall / Virtual private network / IPsec / Proxy server / Computer network security / Computing / Network architecture

CR25iNG Future-ready Future-ready Security for SOHO/ROBO networks

Add to Reading List

Source URL: www.cyberoam.com

Language: English - Date: 2015-02-05 05:43:00
127Cyberwarfare / Check Point VPN-1 / Firewall / Check Point / NetScreen Technologies / Application firewall / Comparison of firewalls / Computer network security / Computer security / Computing

Skybox_FirewallAssurance_DS.indd

Add to Reading List

Source URL: www.edvance.com.hk

Language: English - Date: 2012-07-10 03:56:57
128Network architecture / Cyberoam / Application firewall / Stateful firewall / Virtual private network / Security appliance / Firewall / Proxy server / IPsec / Computer network security / Computing / Computer security

Cyberoam CR1000iNG-XP Datasheet

Add to Reading List

Source URL: www.cyberoam.com

Language: English - Date: 2015-03-16 06:36:54
129Network architecture / Cyberoam / Application firewall / Stateful firewall / Virtual private network / Security appliance / Firewall / Proxy server / IPsec / Computer network security / Computing / Computer security

Cyberoam CR2500iNG-XP Datasheet

Add to Reading List

Source URL: www.cyberoam.com

Language: English - Date: 2015-03-16 06:36:50
130Cyberwarfare / Application firewall / Stateful firewall / Distributed firewall / Firewall / Network security / Network address translation / Computer network / Network switch / Computer network security / Computing / Computer security

DEPEND 2014 : The Seventh International Conference on Dependability Network-Security-Policy Analysis Christian Pitscheider Dip. di Automatica e Informatica

Add to Reading List

Source URL: security.polito.it

Language: English - Date: 2015-02-16 02:27:52
UPDATE