Firewall

Results: 2502



#Item
831Networking hardware / Router / Server appliance / Packet Processing / Network switch / Communications protocol / Firewall / Forwarding plane / Computing / Network architecture / Data

Programming language optimizations for modular router configurations Eddie Kohler∗ ∗ Robert Morris†

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2002-08-01 14:31:16
832Data / Information / XACML / Security policy / Datalog / Maximum flow problem / Flow network / Distributed firewall / SQL / Computing / Network flow / Query languages

Practical Declarative Network Management Timothy Hinrichs Natasha Gude Martin Casado

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-03-09 22:02:42
833Hyper-V / Windows Server / Hypervisor / VM / Virtual firewall / Kernel-based Virtual Machine / Carrier Grade Linux / Comparison of platform virtual machines / Hardware virtualization / System software / Software / Virtual machines

WIND RIVER TITANIUM SERVER The carrier network is undergoing the biggest transformation since the beginning of the Internet. Video, mobile, and cloud usage is driving huge growth in traffic and overwhelming the current n

Add to Reading List

Source URL: www.windriver.com

Language: English - Date: 2015-02-27 13:09:11
834Arts / Contemporary art / Island6 / Liu Dao / Thomas Charvériat / Wang Dongma / Zhang Deli / Digital artists / New media artists / Visual arts

Far Beyond the Firewall featuring the artists of the island6 collective In Far beyond the Firewall, island6’s 58th exhibition, we explore cultural discrepancies that form out of communication barriers, perplexing forei

Add to Reading List

Source URL: www.island6.org

Language: English - Date: 2015-01-26 05:02:57
835Security / Imperva / Application firewall / Vulnerability / Threat / Database security / Computer security / Cyberwarfare / Computer network security

Database SecureSphere Discovery and Assessment Server (DAS) Vulnerability Assessment and Configuration Audit SecureSphere Discovery and Assessment Server (DAS) identifies database vulnerabilities and measures compliance

Add to Reading List

Source URL: www.edvancesecurity.com

Language: English - Date: 2012-05-04 00:17:42
836Cloud computing / Akamai Technologies / Content delivery network / Cloud storage / File sharing / Peercasting / Application firewall / Application security / Computing / Concurrent computing / Computer security

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona Client Reputation Client Reputation data is used to improve security decisions. Billions of IP addresses interact with the Akamai Intelligent Platform every month. The

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2015-04-08 06:50:03
837System software / Content-control software / Spam filtering / Internet censorship / Proxy server / Firewall / Content filtering / Isheriff / Computing / Computer network security / Computer security

ContentKeeper® Express MONITOR MANAGE CONTROL SECURE ENTERPRISE WEB FILTERING AS A SERVICE Hassle-free Internet Filtering

Add to Reading List

Source URL: www.contentkeeper.ca

Language: English - Date: 2009-03-31 01:03:51
838National security / Public safety / Computer network security / Data security / Information security management system / Security engineering / Application firewall / Security / Crime prevention / Computer security

Safety & Security in Computer Based Systems Brian Gladman Talk Outline • Compare and contrast the approach to safety

Add to Reading List

Source URL: www.fipr.org

Language: English - Date: 2006-08-16 07:05:46
839

F É V R I E R 2015 · É D I T I O N F R A N Ç A I S E N ° 310 · W W W.E P O C H T I M E S .F R Année de la Chèvre Une brèche dans le « Great Firewall of China »

Add to Reading List

Source URL: www.epochtimes.fr

Language: French - Date: 2015-02-15 17:09:58
    840Cloud infrastructure / Web services / Amazon Elastic Compute Cloud / Virtual firewall / Cloud storage / Utility computing / Amazon Web Services / IBM cloud computing / Cloud.com / Cloud computing / Computing / Centralized computing

    Cloud Hooks: Security and Privacy Issues in Cloud Computing

    Add to Reading List

    Source URL: www.hicss.hawaii.edu

    Language: English - Date: 2010-11-27 16:02:00
    UPDATE