The book shows you how architecting a modern security visibility infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security investments, and optimize uptime and availability. See the entire threat landscape, understand security visibility basics, support both inline and out-of-band security systems, explore security visibility use cases and ask the right questions about visibility.Sponsored Listing
OSI-Approved Open Source (329)
- GNU General Public License version 2.0 (205)
- BSD License (45)
- GNU Library or Lesser General Public License version 2.0 (36)
- GNU General Public License version 3.0 (32)
- MIT License (13)
- Apache License V2.0 (10)
- GNU Library or Lesser General Public License version 3.0 (9)
- Academic Free License (6)
- Common Development and Distribution License (6)
- Open Software License 3.0 (6)
- Affero GNU Public License (5)
- Adaptive Public License (4)
- Apache Software License (4)
- Eclipse Public License (4)
- Mozilla Public License 1.1 (3)
- Public Domain (10)
- Other License (7)
- Linux (310)
Grouping and Descriptive Categories (200)
- All POSIX (116)
- OS Portable (50)
- All 32-bit MS Windows (45)
- 32-bit MS Windows (28)
- All BSD Platforms (25)
- OS Independent (22)
- 64-bit MS Windows (14)
- Project is an Operating System Distribution (10)
- 32-bit MS Windows (4)
- Project is OS Distribution-Specific (4)
- Project is an Operating System Kernel (3)
- Classic 8-bit Operating Systems (1)
- Windows (196)
- Modern (183)
- Mac (132)
- BSD (129)
- Android (65)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
A real Win32 extensible passive debugger1 weekly downloads
[To Be Released on March 1 2008] the intrusion detection system, NAT for the layman, honeyd and IP Personality on windows. Uses WinPcap4.0.
This is a C source code scanner based on symbolic logic. It analyses C source code (especially that of the Linux kernel, at which it is aimed) for programming errors and vulnerabilities. The tests are defined by the user.1 weekly downloads
Discover Nintex Workflow Cloud - the fastest, easiest way to improve the way you do business. This state-of-the-art technology - built in the cloud, for the cloud - gives you the ability to create powerful, integrated workflows independent of any single platform. With our intuitive, drag-and-drop workflow design canvas, you can configure and deploy automated business processes with speed and simplicity. Try it today!Sponsored Listing
c2xmc, the C-to-any language Macro Converter, is a tool that helps to keep documentation in sync with optional program features selected at compile time via C preprocessor macros.
This projects deals with different robotics algorithms such as motion planning (navigation) , vision SLAM, vision algorithms, and mapping.1 weekly downloads
CDP Dissector is a plugin for Wireshark (the network protocol capture and analyzer tool) to dissect and analyze the UDP-based proprietary CDP protocol (Control Design Platform) from Industrial Control Design.2 weekly downloads
Cov is a code coverage tool to get your code coverage after your runuing some steps for your programs.It is based on llvm(Low Level Virtual Machine,http://llvm.org/).Now,it's only a begining,so welcome anybody to join in.
CQSAT is a powerful, comprehensive and extensible framework for static analysis of program source code and detection of software defects.
ThousandEyes extends visibility across corporate networks as well as the public Internet, helping to solve issues from the branch through MPLS links and SIP trunks to service provider networks. Simulate pre-deployment capacity, monitor detailed performance metrics and see how QoS settings impact call quality.Sponsored Listing
This utility is to construct the interactive function call graph.
This project aims to develop a lib that supports category partition testing. We hope that it is as general as possible but our primary target is to support the functionality of category partition testing to existing test project of crackerjack and LTP.
Cellocity Linux is Based on Fedora Core 6 Source Code. With only basic core elements needed to operate Compatipal and a completley Graphic Interface as well as Text. Version 2.0 will include more applications 32,64 bit and 80 Core Intel CPU
Cerces is an operating system built by the Knights of Linux using OpenSDE. It showcases the newest technology. It is a collaboration effort between the open source community and the users to provide the best environment for all to use.1 weekly downloads
Custom Kumando Virtual Operating System.
Easily access more than 100,000 products and tools with our robust search engine. Manage your entire IT lifecycle from purchase to renewal all in one place — so you can get more done faster.Sponsored Listing
Simple terminal utility that changes the console color1 weekly downloads
ComLinC (a COMmunications Library IN C programming language), a C library for communications research and simulation. It's based on GSL. ComLinC aims at providing elegent, fast functionality to the frequently encountered problems in communications area.1 weekly downloads
Computer Engineering Laboratory manuals Data structures Lab in C in Linux Database labin Oracle Network Programming lab in C in Linux Computer Graphics Lab in C in XWindow System, OpenGL
Processor Configurable On-target GDB client with on-target unit-testing framework. Just implement communications and hardware-specific (registers, step size, etc.) functionality to use.
Control Plane is a benchmark for telecom application environments. It's implementation uses two major software packages: OpenSER and IMS Bench SIPp to compare performance of distinct systems.1 weekly downloads
With Infoblox DDI, your IT teams can consolidate DNS, DHCP, IP address management, & other core network services into a single platform. Orchestrate DDI functions for hybrid & public cloud & virtual & private cloud environments and access rich reporting & analytics capabilities for capacity planning, asset management, compliance control, & auditing. Boost IT efficiency & automation with seamless RESTful API integration.Sponsored Listing
Build with us the most secure operating system in the world! We will combine Debian GNU/Linux with hardware accelerated TrueCrypt, hardware accelerated KVM and secure authentification terminals.
Port of MS _CrtDbg Memory Leak Detection for WinCE10 weekly downloads
Displays all time information... at no cost!
Multithreaded DHCP Load Test Client
DLLInjector is a simple command-line tool for injecting a DLL into a running process.20 weekly downloads
DUMA (Detect Unintended Memory Access) is a multi-platform memory debugging library. It can detect memory leaks and buffer overruns (or underruns) in a malloc() / new memory buffer. DUMA is a fork of Bruce Perens' Electric Fence library.205 weekly downloads
DaChunQiu, as a turn based strategic Chinese history game first, provides developers an engine to create much more games in different century. I also hope more and more people get to know the history of China.大春秋