Defense in depth

Results: 65



#Item
1

At-a-Glance Cisco ASA with FirePOWER Services Evolution Beyond Traditional “Defense in Depth” Security

Add to Reading List

Source URL: www.cisco.com

    2Computer security / Computer network security / Security / Data security / Salvatore J. Stolfo / Defense in depth

    ALDR: A New Metric for Measuring Effective Layering of Defenses Nathaniel Boggs, Salvatore J. Stolfo Columbia University

    Add to Reading List

    Source URL: fm.csl.sri.com

    Language: English - Date: 2011-12-15 18:21:31
    3

    Defense-in-Depth Security for Enterprise IoT Addressing the fundamental vulnerabilities of IP communications “Host Identity Protocol is recognized by the Internet Engineering Task Force (IETF) community as the next pos

    Add to Reading List

    Source URL: www.temperednetworks.com

    Language: English - Date: 2016-03-21 11:51:52
      4

      Solution brief Vectra Networks and next-generation firewalls Building an in-depth defense against advanced cyber attacks

      Add to Reading List

      Source URL: www.vectranetworks.com

      Language: English - Date: 2016-02-06 14:00:47
        5

        Solution brief Building an in-depth defense with Vectra and sandbox security Vectra® Networks is a leading innovator in the realtime, automated detection of in-progress cyber attacks. This solution brief examines how V

        Add to Reading List

        Source URL: www.vectranetworks.com

        Language: English - Date: 2016-02-05 10:52:59
          6

          Solution Brief How to Build Defense in Depth Against Advanced Cyber Attacks with Vectra

          Add to Reading List

          Source URL: www.vectranetworks.com

          Language: English - Date: 2015-08-05 08:33:25
            7

            Solution Brief Vectra and nextgeneration firewalls Building an in-depth defense against advanced cyber-attacks Security solutions are specialized by nature. They

            Add to Reading List

            Source URL: www.vectranetworks.com

            Language: English - Date: 2015-08-05 08:30:50
              8Cyberwarfare / DMZ / Bastion host / Network security / Firewall / Defense in depth / Network address translation / Microsoft Forefront Threat Management Gateway / Comparison of firewalls / Computer network security / Computer security / Computing

              435_Sec2e_07.qxd:29 PM

              Add to Reading List

              Source URL: scitechconnect.elsevier.com

              Language: English - Date: 2015-03-19 08:14:05
              9Data security / Fault-tolerant computer systems / Computer security / Crime prevention / National security / Defense in depth / Firewall / Fault-tolerant system / Redundancy / Computer network security / Security / Computing

              Poster: Defining a Model for Defense-In-Depth James Sullivan, Michael E. Locasto University of Calgary {jfsulliv, locasto}@ucalgary.ca I. I NTRODUCTION

              Add to Reading List

              Source URL: www.ieee-security.org

              Language: English - Date: 2015-05-11 16:42:24
              10

              NRA The Defense in Depth Concept applied to the new regulatory requirements in Japan

              Add to Reading List

              Source URL: www-pub.iaea.org

              - Date: 2013-10-26 03:51:51
                UPDATE