Defense in depth

Results: 65



#Item
1At-a-Glance  Cisco ASA with FirePOWER Services Evolution Beyond Traditional “Defense in Depth” Security

At-a-Glance Cisco ASA with FirePOWER Services Evolution Beyond Traditional “Defense in Depth” Security

Add to Reading List

Source URL: www.cisco.com

    2ALDR: A New Metric for Measuring Effective Layering of Defenses Nathaniel Boggs, Salvatore J. Stolfo Columbia University

    ALDR: A New Metric for Measuring Effective Layering of Defenses Nathaniel Boggs, Salvatore J. Stolfo Columbia University

    Add to Reading List

    Source URL: fm.csl.sri.com

    Language: English - Date: 2011-12-15 18:21:31
    3Defense-in-Depth Security for Enterprise IoT Addressing the fundamental vulnerabilities of IP communications “Host Identity Protocol is recognized by the Internet Engineering Task Force (IETF) community as the next pos

    Defense-in-Depth Security for Enterprise IoT Addressing the fundamental vulnerabilities of IP communications “Host Identity Protocol is recognized by the Internet Engineering Task Force (IETF) community as the next pos

    Add to Reading List

    Source URL: www.temperednetworks.com

    Language: English - Date: 2016-03-21 11:51:52
      4Solution brief  Vectra Networks and next-generation firewalls Building an in-depth defense against advanced cyber attacks

      Solution brief Vectra Networks and next-generation firewalls Building an in-depth defense against advanced cyber attacks

      Add to Reading List

      Source URL: www.vectranetworks.com

      Language: English - Date: 2016-02-06 14:00:47
        5Solution brief  Building an in-depth defense with Vectra and sandbox security Vectra® Networks is a leading innovator in the realtime, automated detection of in-progress cyber attacks. This solution brief examines how V

        Solution brief Building an in-depth defense with Vectra and sandbox security Vectra® Networks is a leading innovator in the realtime, automated detection of in-progress cyber attacks. This solution brief examines how V

        Add to Reading List

        Source URL: www.vectranetworks.com

        Language: English - Date: 2016-02-05 10:52:59
          6Solution Brief  How to Build Defense in Depth Against Advanced Cyber Attacks with Vectra

          Solution Brief How to Build Defense in Depth Against Advanced Cyber Attacks with Vectra

          Add to Reading List

          Source URL: www.vectranetworks.com

          Language: English - Date: 2015-08-05 08:33:25
            7Solution Brief  Vectra and nextgeneration firewalls Building an in-depth defense against advanced cyber-attacks Security solutions are specialized by nature. They

            Solution Brief Vectra and nextgeneration firewalls Building an in-depth defense against advanced cyber-attacks Security solutions are specialized by nature. They

            Add to Reading List

            Source URL: www.vectranetworks.com

            Language: English - Date: 2015-08-05 08:30:50
              8435_Sec2e_07.qxd:29 PM

              435_Sec2e_07.qxd:29 PM

              Add to Reading List

              Source URL: scitechconnect.elsevier.com

              Language: English - Date: 2015-03-19 08:14:05
              9Poster: Defining a Model for Defense-In-Depth James Sullivan, Michael E. Locasto University of Calgary {jfsulliv, locasto}@ucalgary.ca  I. I NTRODUCTION

              Poster: Defining a Model for Defense-In-Depth James Sullivan, Michael E. Locasto University of Calgary {jfsulliv, locasto}@ucalgary.ca I. I NTRODUCTION

              Add to Reading List

              Source URL: www.ieee-security.org

              Language: English - Date: 2015-05-11 16:42:24
              10NRA  The Defense in Depth Concept applied to the new regulatory requirements in Japan

              NRA The Defense in Depth Concept applied to the new regulatory requirements in Japan

              Add to Reading List

              Source URL: www-pub.iaea.org

              - Date: 2013-10-26 03:51:51