Firewall

Results: 2502



#Item
971When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper  Barracuda Networks When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper Barracuda Networks When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling

Add to Reading List

Source URL: www.barracuda.com

Language: English - Date: 2014-06-20 13:43:13
972Securing Virtual Applications with Cisco and Imperva Virtualization offers many benefits, but it also introduces a host of new security risks. Organizations wish to consolidate hardware, reduce power consumption, and str

Securing Virtual Applications with Cisco and Imperva Virtualization offers many benefits, but it also introduces a host of new security risks. Organizations wish to consolidate hardware, reduce power consumption, and str

Add to Reading List

Source URL: www.cisco.com

Language: English
973AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF  Kona Web Application Firewall Application- layer defense to protect against attacks like SQL injections and cross-site scripts  Everyone connected to the enterprise – wor

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona Web Application Firewall Application- layer defense to protect against attacks like SQL injections and cross-site scripts Everyone connected to the enterprise – wor

Add to Reading List

Source URL: www.akamai.fr

Language: English - Date: 2014-07-29 16:36:01
974iBoss logo_dark green+subline

iBoss logo_dark green+subline

Add to Reading List

Source URL: www.iboss.com

Language: English - Date: 2015-03-06 13:22:00
975SPECTRE: A Tool for Inferring, Specifying and Enforcing Web-Security Policies David Scott and Richard Sharp Computer Laboratory, University of Cambridge, William Gates Building, JJ Thompson Avenue, Cambridge CB3 0FD, UK

SPECTRE: A Tool for Inferring, Specifying and Enforcing Web-Security Policies David Scott and Richard Sharp Computer Laboratory, University of Cambridge, William Gates Building, JJ Thompson Avenue, Cambridge CB3 0FD, UK

Add to Reading List

Source URL: dave.recoil.org

Language: English - Date: 2014-05-31 17:38:32
976F-Response Firewall Support Guide Guide to Firewall disabling and exceptions Rev 1.0 October 12, 2012  Email:[removed]

F-Response Firewall Support Guide Guide to Firewall disabling and exceptions Rev 1.0 October 12, 2012 Email:[removed]

Add to Reading List

Source URL: www.f-response.com

Language: English - Date: 2013-03-17 16:25:49
977Positive Technologies Application Firewall Матыков Олег  [removed]

Positive Technologies Application Firewall Матыков Олег [removed]

Add to Reading List

Source URL: www.ptsecurity.ru

Language: Russian - Date: 2014-12-03 05:08:35
    978Akamai CASE STUDY  Akamai Mitigates Politically Motivated Hacktivist Attack on Major US Media Organization The Situation A major media company was the target of hacktivists that felt the organization was being

    Akamai CASE STUDY Akamai Mitigates Politically Motivated Hacktivist Attack on Major US Media Organization The Situation A major media company was the target of hacktivists that felt the organization was being

    Add to Reading List

    Source URL: it.akamai.com

    Language: English - Date: 2012-03-20 07:12:26
    979et  he Datas  WatchGuard®® XTM 1050 and 2050

    et he Datas WatchGuard®® XTM 1050 and 2050

    Add to Reading List

    Source URL: watchguard.com

    Language: English - Date: 2013-01-11 15:18:08
    980Censorship and Co-option of the Internet Infrastructure Michael Bailey Electrical Engineering and Computer Science Department University of Michigan, Ann Arbor, MI[removed]removed]

    Censorship and Co-option of the Internet Infrastructure Michael Bailey Electrical Engineering and Computer Science Department University of Michigan, Ann Arbor, MI[removed]removed]

    Add to Reading List

    Source URL: mdbailey.ece.illinois.edu

    Language: English - Date: 2014-08-05 13:28:18