Data leak protection system, method and apparatus
Data network and method for checking nodes of a data network
Data processing system and method
Data scan mechanism
Data storage device with code scanning capability
Decentralized appliance virus scanning
Defense mechanism for server farm
Delayed-delivery quarantining of network communications...
Denial of service attacks characterization
Denial of service defense by proxy
Denial of service defense by proxy
Denying unauthorized access to a private data processing...
Detecting and preventing malcode execution
Detecting and removing rootkits from within an infected...
Detecting content in files
Detecting dissemination of malicious programs
Detecting method and architecture thereof for malicious codes
Detecting method for network intrusion
Detecting rogue access points in a computer network
Detecting shellcode that modifies IAT entries