The book shows you how architecting a modern security visibility infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security investments, and optimize uptime and availability. See the entire threat landscape, understand security visibility basics, support both inline and out-of-band security systems, explore security visibility use cases and ask the right questions about visibility.Sponsored Listing
- BSD (7)
- Grouping and Descriptive Categories (7)
- Linux (7)
- Modern (7)
- Windows (7)
- Mac (5)
- Real Time Strategy
- Turn Based Strategy
- Side-Scrolling/Arcade Games
An award-winning drawing program for children ages 3 to 1211,261 weekly downloads
TKD Scoring Wi-Fi Server supporting Android and IPhone clients86 weekly downloads
Abysmal is a project that aims to recreate an engine for System Shock 1 and Ultima Underworld that can run those games with the original data files.5 weekly downloads
Simplify teamwork and stay in control of your communications with MegaPath One. Unified communications makes staying in touch with associates easy and efficient. See when others are available. Initiate a chat. Host a voice or video conference from any device, and invite guests to join via web browser. Handle matters quickly from your always-on virtual collaboration space with presence, instant messaging, video conferencing and screen sharing.Sponsored Listing
A text adventure in Java which is also a tutorial for coders.
Forgotten Destruction is a free real-time strategy game developed using the Simple DirectMedia Layer. It focuses on the conflict between an evil shadowy empire and human race with their nearby allies.
An arkanoid 2D game done with allegro.