Application firewall

Results: 701



#Item
201Computing / Firewall / Port knocking / Application firewall / Transmission Control Protocol / Port scanner / Network address translation / Denial-of-service attack / Port / Computer network security / Computer security / Cyberwarfare

THE UNIVERSITY OF CALGARY Enhancing Firewalls: Conveying User and Application Identification to Network Firewalls by

Add to Reading List

Source URL: www.ciphertext.info

Language: English - Date: 2011-11-13 02:02:02
202Application firewall / Cyberwarfare / Firewall / Payment Card Industry Data Security Standard / Riverbed Technology / Armorlogic / Outpost Firewall Pro / Computer network security / Computing / Computer security

Riverbed Stingray Application Firewall Brochure: Riverbed Stingray Application Firewall Stingray Application Firewall is a sophisticated, application-aware Web Application Firewall for deep

Add to Reading List

Source URL: www.datum.com.sg

Language: English - Date: 2011-11-10 03:02:15
203Computer security / Computer network security / Veracode / Software testing / Application security / Software as a service / Vulnerability / Application firewall / Computing / Centralized computing / Cloud computing

VERACODE APPLICATION SECURITY Speed your innovations to market — without sacrificing security Web applications are the #1 attack vector for data breaches, yet only 10% of enterprises test all their critical application

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2015-04-14 16:19:18
204Computing / Data security / Firewall / Malware / Virtual firewall / Denial-of-service attack / Comparison of firewalls / Application firewall / Computer network security / Cyberwarfare / Computer security

Microsoft PowerPoint - Hillstone-corporate-Presentation

Add to Reading List

Source URL: www.peta.co.th

Language: English - Date: 2015-03-18 12:40:38
205Malware / Trend Micro / Computing / Cyberwarfare / Computer network security / Trend Micro Internet Security / Antivirus software / Computer security / Application firewall

GETTING STARTED GUIDE Trend Micro™ Deep Security for Web Apps This document steps you through the basics of how to get started using Trend Micro Deep Security for Web

Add to Reading List

Source URL: docs.trendmicro.com

Language: English - Date: 2015-01-14 19:52:37
206Cyberwarfare / Application firewall / Network security / Firewall / Stateful firewall / Deep packet inspection / Malware / Denial-of-service attack / Comparison of firewalls / Computer network security / Computer security / Computing

iboss_SWG_NGFW_Brochure_slick

Add to Reading List

Source URL: www.iboss.com

Language: English - Date: 2015-03-06 12:47:40
207Networks / Application delivery network / Application firewall / Data center / Hardware virtualization / Virtualization / Server / Application virtualization / Application server / Computing / System software / Software

Next Generation Information System For The Banking and Finance Sector A guide to ADN Planning

Add to Reading List

Source URL: www.f5.com.cn

Language: English
208Computer network security / Software testing / Electronic commerce / Secure communication / Web application security / Application firewall / Cross-site scripting / Penetration test / Application security / Computer security / Cyberwarfare / Computing

Building Web Applications Security Recommendations for Developers Web applications on Internet-facing systems allow access to everyone and operate 24 hours a day and 7 days a week, which leaves them open to attack.

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2013-07-10 11:37:41
209Information technology management / Oracle Database / Deep packet inspection / Application security / Application firewall / Guardium /  an IBM Company / Computer security / Computing / Software

Securing Enterprise Applications 
 Version 1.1

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2014-11-21 13:53:30
210Markup languages / Technical communication / World Wide Web / Internet standards / Hypertext Transfer Protocol / Application firewall / Percent-encoding / Transmission Control Protocol / Gzip / Computing / OSI protocols / Open formats

Microsoft PowerPoint - Protocol-Level Evasion of Web Application Firewalls (Ivan Ristic, Qualys, Black Hat USA[removed]pptx

Add to Reading List

Source URL: community.qualys.com

Language: English - Date: 2015-02-09 23:07:14
UPDATE