Prolexic Technologies

Results: 128



#Item
31Cyberwarfare / Multi-agent systems / Spamming / Computer security / Denial-of-service attack / Botnet / Prolexic Technologies / LOIC / Computer network security / Denial-of-service attacks / Computing

www.vistnet.com DDoS Protection Company The turn of the 20th century marked the birth of DDoS Attacks - a major network threat, relentlessly gaining speed and affecting growing numbers of victims. Prominent sites are no

Add to Reading List

Source URL: www.vistnet.com

Language: English - Date: 2012-03-30 05:54:37
32Multi-agent systems / Spamming / Cyberwarfare / Computer security / Denial-of-service attack / Botnet / Rizon / Cloud computing / Prolexic Technologies / Computer network security / Computing / Denial-of-service attacks

Features › The PopVote attack aftermath The PopVote attack aftermath By Sheila Lam and Carol Ko | 07 Jul 2014 Tag: 

Add to Reading List

Source URL: www.asiacloudcomputing.org

Language: English - Date: 2014-07-21 08:24:59
33Denial-of-service attack / Internet Relay Chat / Rizon / Slowloris / Computing / Cyberspace / Prolexic Technologies / Internet / Stefan Savage / Denial-of-service attacks / Computer network security / Cyberwarfare

March 13, 2015 The Expanding Role of Service Providers in DDoS Mitigation Stratecast Analysis by

Add to Reading List

Source URL: www.arbornetworks.com

Language: English
34Computing / Computer network security / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Verisign / Root name server / Anti-spam techniques / Prolexic Technologies / Domain name system / Denial-of-service attacks / Internet

VRSN_logo_vertical_CMYK_reverse_vector

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2013-12-20 15:52:37
35Computing / Verisign / Denial-of-service attack / Peering / Root name server / Internet backbone / .net / Domain name / Prolexic Technologies / Domain name system / Internet / Network architecture

VRSN_logo_vertical_CMYK_vector

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2014-06-25 11:25:03
36Cyberwarfare / Crime prevention / National security / Electronic commerce / Denial-of-service attack / Intrusion prevention system / Information security / Penetration test / Prolexic Technologies / Computer network security / Security / Computer security

SOLUTION BRIEF DDoS Protection Services LOCAL SERVICE COAST TO COAST

Add to Reading List

Source URL: www.tierpoint.com

Language: English - Date: 2015-02-26 10:56:26
37Akamai Technologies / Content delivery network / Spamming / Multi-agent systems / Denial-of-service attack / Prolexic Technologies / Botnet / Computer network security / Computing / Internet

    Akamai Security Advisory VERSION: G

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2014-01-09 15:26:01
38Cyberwarfare / Computer security / Multi-agent systems / Spamming / Denial-of-service attack / Internet Relay Chat / Botnet / Prolexic Technologies / Null route / Computer network security / Computing / Denial-of-service attacks

Prolexic Quarterly Global DDoS Attack Report - Q1 2013

Add to Reading List

Source URL: www.prolexic.com

Language: English - Date: 2014-03-20 17:09:56
39Akamai Technologies / Content delivery network / Prolexic Technologies / Networks / Denial-of-service attack / Computing / Concurrent computing / Internet

AKAMAI WEB SECURITY SOLUTIONS: PRODUCT BRIEF Prolexic Flow-Based Monitoring Network-layer monitoring for early detection and notification of potential DDoS attacks Organizations increasingly interact with customers, em

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2015-04-06 03:50:01
40Internet / Prolexic Technologies / Akamai Technologies / Denial-of-service attack / Network architecture / Denial-of-service attacks / Computer network security / Computing

AKAMAI WEB SECURITY SOLUTIONS: PRODUCT BRIEF Prolexic Connect As businesses and other organizations move increasingly online, the frequency, scale, and sophistication of denial-of-service (DoS) and distributed denial-of

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2015-03-27 06:58:01
UPDATE