Search

Your search keyword '"Security software -- Product development"' showing total 460 results

Search Constraints

Start Over You searched for: Descriptor "Security software -- Product development" Remove constraint Descriptor: "Security software -- Product development"
460 results on '"Security software -- Product development"'

Search Results

1. Study Findings from University of Ilorin Advance Knowledge in Computational Intelligence (A Multi-level Random Forest Model-Based Intrusion Detection Using Fuzzy Inference System for Internet of Things Networks)

2. Improving intrusion prevention models: dual-threshold and dual-filter approaches

3. A Bayesian networks in Intrusion detection systems

4. A multi-model approach to the detection of Web-based attacks

5. Turning your SELinux policy with audit2allow

6. Secure information systems development - a survey and comparison

7. A survey and trends on Internet worms

9. Security architecture for ODP systems; final results of the CEC COST-11 Ter 'Security' project

10. Implementing rsync-only access over chroot SSH

11. Start-up Threat Stack aims to protect Linux-based clouds from hackers; Cloud Sight software for Linux servers intended to let enterprises watch for hackers going after their data in the cloud

12. Armando Falcon Likes New MBS Idea

15. Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for AMI

16. Networks

17. Radar

18. Core Security Adds Web App Security Testing; Version 7.5 adds the ability to test Web applications for SQL Injection and Remote File Inclusion vulnerabilities, two of significant areas of concern for Web applications

21. Microsoft plays up NAP at Interop; * Microsoft touts NAP interoperability

22. Microsoft Effort Aims To Bolster Online ID Management; The announcements at Interop are part of a broader effort to develop software that makes computers and applications from various manufacturers interoperable with each other

23. Juniper and Microsoft Hook Up for NAC Work

24. Microsoft, TCG, Juniper Tie the NAC Knot

27. New Services Move More Security Into The Network Cloud; AT&T and Trend Micro are both expanding the network-based security services they're offering to business customers

28. Trend Micro Moves Security into the Cloud

29. Trend Micro Moves Security into the Cloud

31. ConSentry alliances could aid NAC integration; * Alliances between ConSentry and other vendors will help customers integrate its NAC

32. RSA to Partner with McAfee and Privaris, Buy Valyd

33. Cisco IPS Integration Turns Security Data Into Information; In addition to improving network security efficiency, Cisco's goal is to integrate reporting from intrusion prevention systems throughout the network

37. Psiphon beats net censors

38. IBM and Narus Offer Telecom Security Package

39. NYC telecom tour Day 3: Security, management steal the show; BMC's boss: 'It's ludicrous that IT is the last automated department today.'

40. Check Point Offers Beta Version of ZoneAlarm 7.0

41. PacNet NetworkGuard introduced by Pacific Internet

43. IBM Unveils Controversial Video Surveillance Technology; The S3 system can be programmed to spot suspicious behavior, such as prolonged lingering at an airport security fence. It could also nab an employee who's spending too much time in the lunchroom

44. F5, Double-Take Look to Speed Up Data Replication

45. Pure Networks and Symantec Hook Up for Consumer Security

47. Symantec Says Microsoft Should Level The Vista Security Playing Field; Symantec may be launching its next generation of security offerings, but antivirus software is its cash cow. Which is why the company's jostling with Microsoft over Vista

48. Microsoft and Cisco build joint access control system

49. Cisco, Microsoft reveal network access product plans

50. Security Vendors Partner Around Web Apps Scanning

Catalog

Books, media, physical & digital resources