The book shows you how architecting a modern security visibility infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security investments, and optimize uptime and availability. See the entire threat landscape, understand security visibility basics, support both inline and out-of-band security systems, explore security visibility use cases and ask the right questions about visibility.Sponsored Listing
OSI-Approved Open Source (115)
- Academic Free License (21)
- GNU General Public License version 2.0 (20)
- Open Software License 3.0 (8)
- Common Public License 1.0 (6)
- Common Development and Distribution License (4)
- Apache License V2.0 (2)
- BSD License (2)
- Eclipse Public License (2)
- European Union Public License (2)
- GNU Library or Lesser General Public License version 2.0 (2)
- PHP License (2)
- Artistic License 2.0 (1)
- Computer Associates Trusted Open Source License 1.1 (1)
- GNU General Public License version 3.0 (1)
- GNU Library or Lesser General Public License version 3.0 (1)
- Public Domain (4)
- Creative Commons Attribution License (3)
- Other License (2)
- Windows (105)
- Linux (80)
- Mac (68)
- Grouping and Descriptive Categories (67)
- Android (35)
- Modern (25)
- BSD (11)
- Emulation and API Compatibility (7)
- Computer Aided Instruction (CAI)
Hot topics in Education Softwaresakai
- License: Educational Community License, Version 2.0 ×
Web-based student information system. Cross-platform, comprehensive system , gives parents real-time access to student performance, and creates an online school community
Management and Development a Drugstore
Public storage for the projects created by Mera interns
There's no event quite like OSCON—the best place on Earth to sharpen your skills and discover new techniques, making you better at what you do and igniting your love of all things digital. You'll find everything open source: languages, communities, best practices, products and services. Join us May 8-11 in Austin, TX, and let OSCON ignite your love of all things digital!Sponsored Listing
A UK-based organisation developing Open Source solutions for deployment in the educational sector. Such solutions including an Active Directory/RM Community Connect alternative, website and mail, office software, etc.
Practice of the subject TDP from UOC
Program for using PCI1780 under QNX for science researching
Software de aprendizaje de piano
Applications and shared infrastructure for humanities research.
Simplify teamwork and stay in control of your communications with MegaPath One. Unified communications makes staying in touch with associates easy and efficient. See when others are available. Initiate a chat. Host a voice or video conference from any device, and invite guests to join via web browser. Handle matters quickly from your always-on virtual collaboration space with presence, instant messaging, video conferencing and screen sharing.Sponsored Listing
SimpleScalar un entorno de simulación para diferentes arquitecturas hardware. Modificacion de algunos archivos para que funcione correctamente la version educativa
This software is a timetable maker for educational institutes.
Red Kite project involing staff and students from schools in the teesdale district. A collaborative project where resources are developed and shared to enhance the learning experience.
Unified Campus Solution covering academic management, learning management, student information system, general administration, accounting and human resource management.
The Virtual Laboratory for Earth and Planetary Materials (VLab) collaborative GRID-based environment. Concentrating on scientific computation workflows and auto-generation of visualization services. http://vlab.msi.umn.edu
ThousandEyes extends visibility across corporate networks as well as the public Internet, helping to solve issues from the branch through MPLS links and SIP trunks to service provider networks. Simulate pre-deployment capacity, monitor detailed performance metrics and see how QoS settings impact call quality.Sponsored Listing
We extend a model of exploration and exploitation to consider the context of hierarchical organizations of varying size and depth, in either the absence or presence of a knowledge management (KM) system.