Network Management Application

Results: 752



#Item
721Computing / Software testing / Hacking / Electronic commerce / Vulnerability / Application security / Cross-site scripting / SQL injection / Web application security / Computer security / Cyberwarfare / Computer network security

WAS™ Vulnerability Management for Web Applications Market Landscape As modern businesses look to web applications to provide services and perform special functions, they simultaneously increase their risk exposure. The

Add to Reading List

Source URL: www.outpost24.com

Language: English - Date: 2013-09-06 03:49:32
722Management / Operations research / Planning / Scheduling / Throughput / Access time / Latency / Low latency / CFQ / Scheduling algorithms / Network performance / Network management

New version of BFQ, benchmark suite and experimental results Technical Report February 11, 2014 This document is a revised and extended version of the paper: P. Valente, M. Andreolini, “Improving Application Responsive

Add to Reading List

Source URL: algogroup.unimo.it

Language: English - Date: 2014-02-11 07:08:53
723Marketing / Product management / Identification / Trademark / Civil law / United States trademark law / Allegation of use / Concurrent use registration / Intellectual property law / Trademark law / Brand management

TRADEMARK INFORMATION NETWORK CRITICAL APPLICATION ISSUES Use the electronic resources provided by the Office Search on the Trademark Electronic Search System (TESS) File on the Trademark Electronic Application System (T

Add to Reading List

Source URL: www.uspto.gov

Language: English - Date: 2010-08-12 15:25:36
724Cyberwarfare / Cyberoam / Security appliance / Fortinet / Application firewall / Unified threat management / Netasq / Check Point / ESoft / Computer network security / Computing / Computer security

Magic Quadrant for Unified Threat Management Gartner RAS Core Research Note G00205369, John Pescatore, Bob Walder, 22 October 2010, R3494[removed]Unified threat management devices provide all-in-one security in a single

Add to Reading List

Source URL: www.globalgate.com.ar

Language: English - Date: 2011-01-24 14:00:01
725Computing / Computer network security / Bring your own device / Acceptable use policy / Network Access Control / Virtual LAN / Operating system / Mobile application management / Technology / Mobile technology / Mobile device management

Bring your own device (BYOD) A YHGfL Foundation White Paper October 2012 Bring your own device (BYOD)

Add to Reading List

Source URL: www.yhgfl.net

Language: English - Date: 2014-06-01 04:14:28
726System software / Application firewall / XML firewall / Firewall / Web Access Management / Load balancing / Armorlogic / Novell Cloud Security Service / Computer network security / Computing / Computer security

Web Application Firewall Web Services Firewall Web Access Management RELIABILITY, PERFORMANCE AND CONTINUITY

Add to Reading List

Source URL: www.bee-ware.net

Language: English - Date: 2012-07-26 05:35:28
727Network performance / System software / Computer network security / Application firewall / Reverse proxy / Proxy server / XML firewall / Firewall / Web Access Management / Computing / Computer networking / Computer security

Unified Web application • Centralized management console • Web Application Firewall delivery platform i-Box Platforms

Add to Reading List

Source URL: www.bee-ware.net

Language: English - Date: 2012-07-26 05:12:51
728Management / Operations research / Planning / Scheduling / Throughput / Access time / Latency / Low latency / CFQ / Scheduling algorithms / Network performance / Network management

New version of BFQ, benchmark suite and experimental results Technical Report February 11, 2014 This document is a revised and extended version of the paper: P. Valente, M. Andreolini, “Improving Application Responsive

Add to Reading List

Source URL: www.algogroup.unimo.it

Language: English - Date: 2014-02-11 07:08:53
729Computer network security / Security / Information technology management / Software development process / Application security / Vulnerability / DevOps / Security testing / HP Application Security Center / Computer security / Cyberwarfare / Software testing

How to Choose an Application Security

Add to Reading List

Source URL: www.quotium.com

Language: English - Date: 2014-01-24 04:51:20
730WAN optimization / Server Message Block / Exinda / Traffic shaping / Messaging Application Programming Interface / AppEx Networks / Riverbed Technology / Computing / Network performance / Network protocols

Optimize Your Microsoft Infrastructure Leveraging Exinda’s Unified Performance Management

Add to Reading List

Source URL: www.netutils.com

Language: English - Date: 2012-02-15 06:28:44
UPDATE