Deep-secure

Results: 79



#Item
51Cisco Systems / Deep packet inspection / Cisco IOS / Pidgin / Computer network / Software / Videotelephony / Cross-platform software

AIRS™ The AvFinity Integrated Router Solution™ A Secure, Multi-protocol, Data Manipulation Solution PRODUCT OVERVIEW AIRS combines all the strengths of

Add to Reading List

Source URL: ww1.prweb.com

Language: English - Date: 2011-07-22 12:23:59
52Server appliance / Computer architecture / Cisco Systems / Deep packet inspection / Videotelephony / Cisco Security Manager / Cisco ASA / EtherChannel / Netflow / Computing / System software / Computer network security

Cisco Secure Data Center for Enterprise Single Site Clustering with Cisco TrustSec Technology Implementation Guide Last Updated: March 19, 2014 About the Authors

Add to Reading List

Source URL: www.cisco.com

Language: English
53Water / Aquifer / Relative permeability / Reservoir simulation / Petroleum reservoir / Water content / Permeability / Injection well / Petroleum / Hydrology / Soft matter / Chemistry

Strategies for Maximizing Secure Storage of CO2 in Deep Aquifers Steven Bryant Director, Geological CO2 Storage JIP Center for Petroleum and Geosystems Engineering

Add to Reading List

Source URL: cmi.princeton.edu

Language: English - Date: 2009-07-23 10:32:19
54Industrial automation / Automation / Data security / EtherNet/IP / Firewall / Common Industrial Protocol / Deep packet inspection / Security appliance / SCADA / Technology / Computer network security / Industrial Ethernet

Belden Assists Schneider Electric to Secure Critical Industrial Automation Systems New ConneXium Tofino Firewall Protects EtherNet/IP Communications St. Louis, Missouri – January 28, 2014 – Belden Inc. (NYSE: BDC), a

Add to Reading List

Source URL: www.modbus.org

Language: English - Date: 2014-02-05 15:48:08
55Information / Internet protocols / OSI protocols / Cyberwarfare / Data security / Firewall / Port / Deep packet inspection / Transmission Control Protocol / Data / Computing / Computer network security

HONE: Correlating Host activities to Network communications to produce insight GLENN A. FINK, PH.D. Senior Scientist, Secure Cyber Systems

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2013-09-05 11:03:24
56International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Privacy / Computer security / Internet privacy / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Ethics / Computer crimes / Security

May 14, 2012 Dear Senator, We, the undersigned organizations, write to express our deep concerns with S. 2151, the SECURE IT Act of[removed]In particular, we are concerned that the information-sharing provisions in Title

Add to Reading List

Source URL: aallnet.org

Language: English
57Electronic commerce / Internet / Network architecture / Computer network security / Internet standards / Transport Layer Security / Deep packet inspection / HTTP Secure / Application firewall / Computing / Secure communication / Cryptographic protocols

DPI-SSL Document Scope This document describes the DPI-SSL feature available in SonicOS 5.6. This document contains the following sections: •

Add to Reading List

Source URL: www.sonicwall.com

Language: English
58Cisco Systems / Deep packet inspection / Server appliance / Electronic engineering / Cisco Unified Computing System / Cisco ASA / Cisco Career Certifications / Cisco IOS / Computing / Computer network security / Videotelephony

Secure Data Center Solution Spurs Economic Growth EXECUTIVE SUMMARY Customer Case Study

Add to Reading List

Source URL: www.cisco.com

Language: English
59International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Privacy / Computer security / Internet privacy / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Ethics / Computer crimes / Security

May 14, 2012 Dear Senator, We, the undersigned organizations, write to express our deep concerns with S. 2151, the SECURE IT Act of[removed]In particular, we are concerned that the information-sharing provisions in Title

Add to Reading List

Source URL: aallnet.org

Language: English
60Electronics / Cisco Systems / Deep packet inspection / Videotelephony / Computer networking / Cisco Unified Computing System / Certis CISCO / Network security / Converged infrastructure / Computing / Cloud computing / Technology

White Paper Cisco Secure Enclaves Architecture Design Guide © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.

Add to Reading List

Source URL: www.cisco.com

Language: English
UPDATE