Firewall software

Results: 818



#Item
11One Laptop per Child / Software / Computing / System software / Bitfrost / Laptop / Sugar / Security token / Personal firewall / OLPC XS / Hardware restriction

Bitfrost: the One Laptop per Child Security Model Ivan Krsti´c Simson L. Garfinkel One Laptop per Child

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-08 09:53:29
12Computing / Software / System software / Cloud infrastructure / Microservices / VM / Hyper-V / Cloud computing / Network function virtualization / Application firewall / OpenStack / Web application firewall

Security-as-a-Service for Microservices-Based Cloud Applications Yuqiong Sun Penn State University Email: Susanta Nanda

Add to Reading List

Source URL: www.cse.psu.edu

Language: English - Date: 2016-06-29 21:39:36
13Computing / Computer network security / Computer security / Computer networking / Internet privacy / Network performance / Proxy server / Firewall / Stateful firewall / SOCKS

Greenshades Software hosts a variety of web pages that are intended for client use, such as GreenEmployee.com, GreenshadesOnline.com, and DownloadMyForm.com. Additionally, many of our software applications run on client-

Add to Reading List

Source URL: www.greenshades.com

Language: English - Date: 2015-10-14 12:18:54
14Computer security / Security / Computing / Veracode / Software testing / Web application firewall / Application security / Vulnerability / Application firewall

Veracode Runtime Protection

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2016-06-03 14:45:23
15Computing / System software / Computer network security / Computer security / IP addresses / Computer networking / Data security / PfSense / Proxy server / Private network / Firewall / Subnetwork

Zeroshell as filtering bridge with connection tracking log and HAVP proxy I have already used and administrated several Firewall distributions, like IP-Cop, PFSense, Monowall, RouterOS, OpenWRT, DD-WRT, but none of them

Add to Reading List

Source URL: www.zeroshell.net

Language: English - Date: 2011-12-28 16:45:43
16Computer security / Cyberwarfare / Security / Computer network security / Hacking / Software testing / Vulnerability / Application security / Web application firewall

Microsoft PowerPoint - VulnerabilityManagementInAnApplicationSecurityWorld_OWASPDC_20090805.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:23
17Software / Computing / Computer security / Computer network security / Cyberwarfare / Cloud computing / Cloud storage / OwnCloud / Application firewall / Fail2ban / Intrusion detection system / Denial-of-service attack

Optimizing ownCloud Security Tips & tricks for the security conscientious A recent study by Harris Interactive found that 38% of those surveyed admitted to using a file sharing solution that is not approved by IT leaving

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2016-05-20 05:22:47
18Computing / Computer networking / Computer network security / Network architecture / Network management / Local area networks / Open vSwitch / Software-defined networking / Traffic flow / Firewall / Load balancing / NetFlow

Virtual Network Diagnosis as a Service Wenfei Wu, Guohui Wang, Aditya Akella, Anees Shaikh Abstract Today’s cloud network platforms allow tenants to construct sophisticated virtual network topologies among their VMs on

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2013-10-01 17:21:19
19Computer network security / Computer security / Cyberwarfare / Computing / Data security / Firewall / Network management / Antivirus software

Classics Department Computing Resources Guide This document is intended to provide quick guidance for new faculty, new graduate students, and research visitors in Classics and AHMA. Table of Contents CalNet ID—the esse

Add to Reading List

Source URL: ucbclassics.dreamhosters.com

Language: English
20Computing / Network architecture / Computer networking / Crime prevention / Cryptography / National security / Network segmentation / Virtual firewall / Data center / Check Point / Computer security / Information security

Whitepaper Unlock the full potential of data center virtualization with micro-segmentation Making software-defined security (SDS) work for your data center It’s time to unlock the full potential

Add to Reading List

Source URL: www.nttsecurity.com

Language: English - Date: 2016-07-26 13:04:40
UPDATE