Network Management Application

Results: 752



#Item
141Computer network security / Software testing / Data security / National security / Application security / Vulnerability / Information security management system / Software development process / Penetration test / Security / Computer security / Cyberwarfare

The State of Application Security A Research Study by Ponemon Institute LLC and Security Innovation The State of Application Security An Organizational Maturity study by

Add to Reading List

Source URL: www.securityinnovation.com

Language: English - Date: 2013-08-16 15:26:12
142Computing / Cooperative Association for Internet Data Analysis / System software / Traffic classification / IPTV / RMON / Multi Router Traffic Grapher / James Won-Ki Hong / Network management / Information technology management / Internet television

Automated Application Signatur e Generation for Traffic Identification Young J. Won, Seong-Chul Hong, Byung-Chul Park, and James W. Hong Distributed Processing and Network Management Lab.

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-02-02 18:46:17
143Cyberwarfare / Unified threat management / Check Point / Network security / Sophos / Firewall / Cisco Systems / Cyberoam / Application firewall / Computer network security / Computing / Computer security

BCT Primary Consumer logo

Add to Reading List

Source URL: www.bendigotelco.com.au

Language: English - Date: 2015-02-11 00:36:30
144Hewlett-Packard / Java enterprise platform / Business software / HP OpenView / Network management / System administration / HP Software Division / HP Quality Center / HP Application Security Center / Computing / Software / Information technology management

Product Catalog Spectrum Systems, LLC Key Manufacturers and Key Products – September3250 option #2 for Sales

Add to Reading List

Source URL: www.spectrum-systems.com

Language: English - Date: 2013-12-04 02:17:17
145Markup languages / Geographic information systems / Data management / XML / Database schema / Data model / Infrastructure for Spatial Information in the European Community / Physical schema / GML Application Schemas / Computing / Data / Information

Rob Walker Consultancy Technical Guidance for the INSPIRE Schema Transformation Network Service EC JRC Contract

Add to Reading List

Source URL: inspire.ec.europa.eu

Language: English - Date: 2010-12-15 12:53:16
146Management / Performance management / Virtualization / Business transaction management / Hardware virtualization / Application performance management / System software / Computing / System administration

ExtraHop for Virtualized and Cloud Environments Monitor All Applications. All the Time. In Real Time. The ExtraHop platform is a non-intrusive network appliance that “ExtraHop can play a critical

Add to Reading List

Source URL: www.extrahop.com

Language: English - Date: 2013-08-21 20:38:28
147Tin Shui Wai / Yuen Long District / Mai Po Marshes / Wetland conservation / Wetland / Protected areas of China / China Biosphere Reserve Network / Hong Kong / Conservation in Hong Kong / Hong Kong Wetland Park

Survey Results on the Application of Wetland Management Training Programme and Updates from Previous ParticipantsIn, WWF-Hong Kong organized 10 wetland management training courses in Mai Po, attended b

Add to Reading List

Source URL: awsassets.wwfhk.panda.org

Language: English - Date: 2015-02-10 03:34:15
148Security / Vulnerability management / Vulnerability / Qualys / CVSS / Network vulnerability scan / SAINT / Application security / Computer network security / Computer security / Cyberwarfare

network on white background. Isolated 3D image

Add to Reading List

Source URL: www.algosec.com

Language: English - Date: 2014-07-07 06:08:17
149Computing / Deep content inspection / Network security / Application firewall / Distributed firewall / Check Point / Computer network security / Computer security / Cyberwarfare

Endpoint Based Policy Management: The Road Ahead Introduction In a rapidly growing and crowded security solutions market, organizations need to deploy the most effective technologies taking into consideration the legiti

Add to Reading List

Source URL: www.netveda.com

Language: English - Date: 2011-01-21 15:58:56
150Network management / EMC Corporation / VMware / Hyper-V / Multi-agent systems / Network Instruments / Pandora FMS / Software / System software / Computing

The fastest, easiest, most affordable application and network monitoring software. Comprehensive Monitoring Coverage Operating Systems

Add to Reading List

Source URL: www.heroix.com

Language: English
UPDATE