The book shows you how architecting a modern security visibility infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security investments, and optimize uptime and availability. See the entire threat landscape, understand security visibility basics, support both inline and out-of-band security systems, explore security visibility use cases and ask the right questions about visibility.Sponsored Listing
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
Software defined radio for Linux and Mac182 weekly downloads
This software allows for a user to generate test data. This is useful for testing Hadoop or other data processing clusters.2 weekly downloads
A techonogically advanced engine using C++ and ASM as languages.
ThousandEyes extends visibility across corporate networks as well as the public Internet, helping to solve issues from the branch through MPLS links and SIP trunks to service provider networks. Simulate pre-deployment capacity, monitor detailed performance metrics and see how QoS settings impact call quality.Sponsored Listing
The goal of this project is to develop a completely open source Cross Domain Solution that can be used in accredited environments by the U.S. Government or by commercial entities who have need to share data between networks that require high security.