[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Dunkerley et al., 2022 - Google Patents

Mastering Windows Security and Hardening

Dunkerley et al., 2022

View PDF
Document ID
48715218880036131
Author
Dunkerley M
Tumbarello M
Publication year

External Links

Snippet

Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the authors, nor Packt Publishing or its dealers …
Continue reading at cdn.ttgtmedia.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
US11438365B2 (en) Hierarchical risk assessment and remediation of threats in mobile networking environment
US11134058B1 (en) Network traffic inspection
US10958662B1 (en) Access proxy platform
US11843577B2 (en) Fingerprinting to identify devices and applications for use in management and policy in the cloud
US11134386B2 (en) Device identification for management and policy in the cloud
US11457040B1 (en) Reverse TCP/IP stack
US8266672B2 (en) Method and system for network identification via DNS
US10931669B2 (en) Endpoint protection and authentication
US20230247003A1 (en) Zero trust private application access for government applications
US7966650B2 (en) Dynamic internet address assignment based on user identity and policy compliance
US20240146760A1 (en) Systems and Methods for Network Security
WO2018004600A1 (en) Proactive network security using a health heartbeat
US11363022B2 (en) Use of DHCP for location information of a user device for automatic traffic forwarding
US20230019448A1 (en) Predefined signatures for inspecting private application access
Sangster et al. Network endpoint assessment (NEA): Overview and requirements
US20230231884A1 (en) Browser fingerprinting and control for session protection and private application protection
Chauhan Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus
US11757975B1 (en) Systems and methods for monitoring a file download
US20240129297A1 (en) Domain ownership verification for a ztna service platform
Dunkerley et al. Mastering Windows Security and Hardening
WO2019195502A1 (en) Securing endpoints in a heterogenous enterprise network
Khandelwal et al. Frontline techniques to prevent web application vulnerability
US20230319093A1 (en) Containerized network activity filtering
Liu et al. Account Lockouts: Characterizing and Preventing Account Denial-of-Service Attacks
Sheikh Certified Ethical Hacker (CEH) Preparation Guide