Firewall software

Results: 818



#Item
11Bitfrost: the One Laptop per Child Security Model Ivan Krsti´c Simson L. Garfinkel  One Laptop per Child

Bitfrost: the One Laptop per Child Security Model Ivan Krsti´c Simson L. Garfinkel One Laptop per Child

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-08 09:53:29
12Security-as-a-Service for Microservices-Based Cloud Applications Yuqiong Sun Penn State University Email:   Susanta Nanda

Security-as-a-Service for Microservices-Based Cloud Applications Yuqiong Sun Penn State University Email: Susanta Nanda

Add to Reading List

Source URL: www.cse.psu.edu

Language: English - Date: 2016-06-29 21:39:36
13Greenshades Software hosts a variety of web pages that are intended for client use, such as GreenEmployee.com, GreenshadesOnline.com, and DownloadMyForm.com. Additionally, many of our software applications run on client-

Greenshades Software hosts a variety of web pages that are intended for client use, such as GreenEmployee.com, GreenshadesOnline.com, and DownloadMyForm.com. Additionally, many of our software applications run on client-

Add to Reading List

Source URL: www.greenshades.com

Language: English - Date: 2015-10-14 12:18:54
14Veracode Runtime Protection

Veracode Runtime Protection

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2016-06-03 14:45:23
15Zeroshell as filtering bridge with connection tracking log and HAVP proxy I have already used and administrated several Firewall distributions, like IP-Cop, PFSense, Monowall, RouterOS, OpenWRT, DD-WRT, but none of them

Zeroshell as filtering bridge with connection tracking log and HAVP proxy I have already used and administrated several Firewall distributions, like IP-Cop, PFSense, Monowall, RouterOS, OpenWRT, DD-WRT, but none of them

Add to Reading List

Source URL: www.zeroshell.net

Language: English - Date: 2011-12-28 16:45:43
16Microsoft PowerPoint - VulnerabilityManagementInAnApplicationSecurityWorld_OWASPDC_20090805.ppt [Compatibility Mode]

Microsoft PowerPoint - VulnerabilityManagementInAnApplicationSecurityWorld_OWASPDC_20090805.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:23
17Optimizing ownCloud Security Tips & tricks for the security conscientious A recent study by Harris Interactive found that 38% of those surveyed admitted to using a file sharing solution that is not approved by IT leaving

Optimizing ownCloud Security Tips & tricks for the security conscientious A recent study by Harris Interactive found that 38% of those surveyed admitted to using a file sharing solution that is not approved by IT leaving

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2016-05-20 05:22:47
18Virtual Network Diagnosis as a Service Wenfei Wu, Guohui Wang, Aditya Akella, Anees Shaikh Abstract Today’s cloud network platforms allow tenants to construct sophisticated virtual network topologies among their VMs on

Virtual Network Diagnosis as a Service Wenfei Wu, Guohui Wang, Aditya Akella, Anees Shaikh Abstract Today’s cloud network platforms allow tenants to construct sophisticated virtual network topologies among their VMs on

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2013-10-01 17:21:19
19Classics Department Computing Resources Guide This document is intended to provide quick guidance for new faculty, new graduate students, and research visitors in Classics and AHMA. Table of Contents CalNet ID—the esse

Classics Department Computing Resources Guide This document is intended to provide quick guidance for new faculty, new graduate students, and research visitors in Classics and AHMA. Table of Contents CalNet ID—the esse

Add to Reading List

Source URL: ucbclassics.dreamhosters.com

Language: English
20Whitepaper  Unlock the full potential of data center virtualization with micro-segmentation Making software-defined security (SDS) work for your data center It’s time to unlock the full potential

Whitepaper Unlock the full potential of data center virtualization with micro-segmentation Making software-defined security (SDS) work for your data center It’s time to unlock the full potential

Add to Reading List

Source URL: www.nttsecurity.com

Language: English - Date: 2016-07-26 13:04:40