Dunkerley et al., 2022 - Google Patents
Mastering Windows Security and HardeningDunkerley et al., 2022
View PDF- Document ID
- 48715218880036131
- Author
- Dunkerley M
- Tumbarello M
- Publication year
External Links
Snippet
Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the authors, nor Packt Publishing or its dealers …
- 238000002360 preparation method 0 abstract description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11438365B2 (en) | Hierarchical risk assessment and remediation of threats in mobile networking environment | |
US11134058B1 (en) | Network traffic inspection | |
US10958662B1 (en) | Access proxy platform | |
US11843577B2 (en) | Fingerprinting to identify devices and applications for use in management and policy in the cloud | |
US11134386B2 (en) | Device identification for management and policy in the cloud | |
US11457040B1 (en) | Reverse TCP/IP stack | |
US8266672B2 (en) | Method and system for network identification via DNS | |
US10931669B2 (en) | Endpoint protection and authentication | |
US20230247003A1 (en) | Zero trust private application access for government applications | |
US7966650B2 (en) | Dynamic internet address assignment based on user identity and policy compliance | |
US20240146760A1 (en) | Systems and Methods for Network Security | |
WO2018004600A1 (en) | Proactive network security using a health heartbeat | |
US11363022B2 (en) | Use of DHCP for location information of a user device for automatic traffic forwarding | |
US20230019448A1 (en) | Predefined signatures for inspecting private application access | |
Sangster et al. | Network endpoint assessment (NEA): Overview and requirements | |
US20230231884A1 (en) | Browser fingerprinting and control for session protection and private application protection | |
Chauhan | Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus | |
US11757975B1 (en) | Systems and methods for monitoring a file download | |
US20240129297A1 (en) | Domain ownership verification for a ztna service platform | |
Dunkerley et al. | Mastering Windows Security and Hardening | |
WO2019195502A1 (en) | Securing endpoints in a heterogenous enterprise network | |
Khandelwal et al. | Frontline techniques to prevent web application vulnerability | |
US20230319093A1 (en) | Containerized network activity filtering | |
Liu et al. | Account Lockouts: Characterizing and Preventing Account Denial-of-Service Attacks | |
Sheikh | Certified Ethical Hacker (CEH) Preparation Guide |