ComputerWeekly.com Research Library

Powered by Bitpipe.com

Tunneling White Papers

  • Types of DNS Attacks Reveal DNS Defense Tactics

    Sponsored by: TechTarget Security

    This E-Guide from SearchSecurity.com details different types of common domain name system (DNS) attacks, the unusual behaviors they invoke, and which defense tactics work best in the given scenario. View now to learn more!

  • Open, Manage, and Accelerate SSL Encrypted Applications

    Sponsored by: BlueCoat

    Enterprise users and their data have never been further apart. Business pressures that keep employees out of headquarters and close to customers and partners have met head-on with other drivers that are bringing far flung servers back to the datacenter.

  • How to Gain Visibility and Control of Encrypted SSL Web Sessions

    Sponsored by: BlueCoat

    Blue Coat's SSL proxy functionality enables organizations to extend the power of the intelligent and secure proxy appliances to all SSL traffic. Read about how a proxy gives visibility and control of SSL communications.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.