Network intrusion detection system

Results: 247



#Item
11Parapet_Service_Overview_20020522.doc

Parapet_Service_Overview_20020522.doc

Add to Reading List

Source URL: www.ventajamarketing.com

Language: English - Date: 2008-12-09 00:36:52
12ALDR: A New Metric for Measuring Effective Layering of Defenses ∗ Nathaniel Boggs Department of Computer Science Columbia University

ALDR: A New Metric for Measuring Effective Layering of Defenses ∗ Nathaniel Boggs Department of Computer Science Columbia University

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
13Optimizing ownCloud Security Tips & tricks for the security conscientious A recent study by Harris Interactive found that 38% of those surveyed admitted to using a file sharing solution that is not approved by IT leaving

Optimizing ownCloud Security Tips & tricks for the security conscientious A recent study by Harris Interactive found that 38% of those surveyed admitted to using a file sharing solution that is not approved by IT leaving

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2016-05-20 05:22:47
14ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-13 10:13:02
15Attack-Test and Verification Systems, Steps Towards Verifiable Anomaly Detection Marcel Fourn´e, Dominique Petersen, Norbert Pohlmann Institut f¨ur Internet-Sicherheit Westf¨alische Hochschule Neidenburger Str. 43

Attack-Test and Verification Systems, Steps Towards Verifiable Anomaly Detection Marcel Fourn´e, Dominique Petersen, Norbert Pohlmann Institut f¨ur Internet-Sicherheit Westf¨alische Hochschule Neidenburger Str. 43

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 12:57:31
16Microsoft PowerPoint - 3_Cybersecurity_myths.pptx

Microsoft PowerPoint - 3_Cybersecurity_myths.pptx

Add to Reading List

Source URL: www.dote.osd.mil

Language: English - Date: 2015-06-12 17:08:23
17ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-03 07:52:04
18THREAT DETECT DIAGRAM v10 CTP copy

THREAT DETECT DIAGRAM v10 CTP copy

Add to Reading List

Source URL: www.redscan.com

Language: English - Date: 2016-03-21 10:46:55
19Mining known attack patterns from security-related events Nicandro Scarabeo1,2 , Benjamin C.M. Fung3 and Rashid H. Khokhar4 1 Department of Electrical and Information Engineering, University of Cassino and Southern  Lazi

Mining known attack patterns from security-related events Nicandro Scarabeo1,2 , Benjamin C.M. Fung3 and Rashid H. Khokhar4 1 Department of Electrical and Information Engineering, University of Cassino and Southern Lazi

Add to Reading List

Source URL: peerj.com

Language: English - Date: 2015-10-07 04:49:41
20NGFW Test Report_Dell SonicWALL SuperMassive E10800

NGFW Test Report_Dell SonicWALL SuperMassive E10800

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2016-04-28 09:34:46