Firewall

Results: 2502



#Item
551Networking hardware / Middlebox / Firewall / Packet Processing / Application firewall / Load balancing / Packet switching / Transmission Control Protocol / Multi-core processor / Computing / Computer network security / Computer networking

Design and Implementation of a Consolidated Middlebox Architecture Vyas Sekar∗ , Norbert Egi†† , Sylvia Ratnasamy† , Michael K. Reiter? , Guangyu Shi †† ∗ Intel Labs, † UC Berkeley, ? UNC Chapel Hill, †

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2012-11-27 06:23:17
552Software / Firewall / Distributed firewall / Iptables / Description logic / Netfilter / Semantic Web Rule Language / PF / Comparison of firewalls / Computer network security / System software / Computing

Confident Firewall Policy Configuration Management using Description Logic ´ Foghl´ William M. Fitzgerald1,2 Simon N. Foley2 M´ıche´ al O u1

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2007-10-22 09:19:27
553Data / Windows Server / Cryptographic protocols / IPsec / Windows / Firewall / Windows Vista networking technologies / Features new to Windows XP / Computing / Computer architecture / Computer network security

IPSEC for Windows – Packet Filtering David Taylor SR Information Security Specialist University of Pennsylvania

Add to Reading List

Source URL: www.upenn.edu

Language: English - Date: 2005-10-14 10:45:59
554Internet / Cyberoam / Wireless security / Unified threat management / Virtual private network / Application firewall / Stateful firewall / Layer 2 Tunneling Protocol / IPsec / Computer network security / Computing / Network architecture

Cyberoam CR25wiNG Datasheet

Add to Reading List

Source URL: www.cyberoam.com

Language: English - Date: 2015-02-05 05:42:43
555Cyberwarfare / Unified threat management / Network security / Microsoft Forefront Threat Management Gateway / Kerio Control / Computer network security / Computer security / Computing

Amaranten Security Gateway F5500 Series Product Data Sheet • Stateful Firewall • Deep Packet Inspection • Built-in VPN

Add to Reading List

Source URL: www.amaranten.com

Language: English - Date: 2012-03-31 05:45:31
556

Cisco RV 120W Wireless-N VPN Firewall (French)

Add to Reading List

Source URL: www.nerim.fr

Language: French - Date: 2014-01-15 05:32:19
    557Computer security / Cyberwarfare / Malware / Denial-of-service attack / Computer virus / Firewall / Spyware / Avira / Targeted threat / System software / Computer network security / Antivirus software

    PA L O A LT O N E T W O R K S : C o n t e n t - I D Te c h n o l o g y B r i e f Content-ID Content-ID enables customers DATA

    Add to Reading List

    Source URL: www.edvance.com.hk

    Language: English - Date: 2012-05-03 22:07:17
    558Internet / Cyberwarfare / Computer network security / Spamming / Virtual assistant / Firewall / Port / Email / Computing / Digital media

    Newsletter  April 2002 Welcome! April 2002 Volume 2, Issue 2

    Add to Reading List

    Source URL: www.execstress.com

    Language: English - Date: 2009-09-07 02:11:09
    559Security / Cloud computing / Computer network security / Antivirus software / VM / Application firewall / Computer virus / Computer security / System software / Computing

    Computer Science DACSA: A Decoupled Architecture for Cloud Security Analysis Jason Gionta, William Enck, Peng Ning – NC State

    Add to Reading List

    Source URL: gionta.org

    Language: English - Date: 2014-12-11 10:21:08
    560Computer security / Computing / Denial-of-service attack / Internet Relay Chat / Computer worms / Network telescope / Stefan Savage / Firewall / Internet security / Computer network security / Denial-of-service attacks / Cyberwarfare

    National Science Foundation Trusted Computing (TC) Solicitation NSFQuantitative Network Security Analysis David Moore, Geoffrey M. Voelker and Stefan Savage

    Add to Reading List

    Source URL: www.caida.org

    Language: English - Date: 2015-05-04 18:48:34
    UPDATE