Intrusion prevention system

Results: 197



#Item
131Security / Technology / Cyberwarfare / Computer security / Wireless security / Wireless intrusion prevention system / Wireless access point / Wardriving / Information security / Wireless networking / Computer network security / Data security

MeerCAT:® Visual Analysis of Wireless Risks to Critical Cyber Assets VALUE PROPOSITION CONTACT INFORMATION

Add to Reading List

Source URL: dtsn.darpa.mil

Language: English - Date: 2013-08-08 13:36:37
132Cyberwarfare / Crime prevention / National security / Data security / Managed Trusted Internet Protocol Service / Intrusion prevention system / Intrusion detection system / Information security / Attack / Security / Computer security / Computer network security

PDF Document

Add to Reading List

Source URL: archives.gov

Language: English - Date: 2013-11-06 08:55:09
133Data security / Ethernet / Wireless security / Electronic engineering / Technology / Wireless intrusion prevention system / WIDS / Network switch / Wi-Fi / Computer network security / Wireless networking / Computing

TECHNICAL DATASHEET VirtualFence Appliance 3e–733A Vulnerability starts at the perimeter. Infrastructure and site surveillance

Add to Reading List

Source URL: www.ultra-3eti.com

Language: English - Date: 2014-05-29 15:39:53
134National security / MIM-23 Hawk / Surveillance / Security / Crime prevention / Public safety

RAPID™ Surveillance Made Mobile The RAPID system is a cost-effective, mobile, and highly capable solution for wide area intrusion detection. The universal radar

Add to Reading List

Source URL: forcepro.ara.com

Language: English - Date: 2014-10-22 15:54:26
135Espionage / Malware / Spyware / Denial-of-service attack / Managed security service / Intrusion prevention system / Norton Internet Security / Computer network security / Cyberwarfare / Computer security

Intrusion Detection Real-time Protection from Known and Unknown Threats. The MegaPath Intrusion Detection service provides real-time detection of network and application attacks by continuously monitoring your network fo

Add to Reading List

Source URL: www.megapath.com

Language: English - Date: 2014-10-06 18:56:53
136Computer security / Hacking / Computer network security / Vulnerability / Communications protocol / Social vulnerability / Symbolic execution / Intrusion prevention system / Parsing / Computing / Software testing / Cyberwarfare

Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration Juan Caballero21 , Zhenkai Liang3 , Pongsin Poosankam21 , Dawn Song1 1

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
137Wireless / Wi-Fi / Bluetooth / Wireless intrusion prevention system / Wireless security / Wireless networking / Technology / Telecommunications engineering

http://www.oit.gatech.edu/library/printable_version.cfm[removed]:45 AM Georgia Institute of Technology Wireless Network Usage Policy Policy No: 03.GIT.100

Add to Reading List

Source URL: www.oit.gatech.edu

Language: English - Date: 2009-07-29 10:10:50
138Computing / Application security / Denial-of-service attack / Vulnerability / Malware / Cross-site scripting / Attack / Application firewall / Intrusion prevention system / Cyberwarfare / Computer network security / Computer security

Attack Mitigation Solution Technology Overview - Whitepaper AMS Technology Overview Whitepaper Table of Contents

Add to Reading List

Source URL: www.brinkster.com

Language: English - Date: 2012-09-28 17:49:19
139Wireless / Cisco Systems / Cisco Wireless Control System / Wireless security / Wireless intrusion prevention system / Wireless LAN / Wi-Fi / Wireless access point / Cisco Career Certifications / Wireless networking / Technology / Electronic engineering

Cisco Wireless LAN Planning and Design Service

Add to Reading List

Source URL: www.cisco.com

Language: English
140NetOps / LandWarNet

Network Intrusion Prevention System (NIPS) The Network Intrusion Prevention System (NIPS) is responsible for the identification, mitigation and reporting of potential hostile network traffic related to vulnerabilities

Add to Reading List

Source URL: www.netcom.army.mil

Language: English - Date: 2009-10-26 18:26:28
UPDATE