Skip to main content

Michele M Jordan

London Metropolitan University

3 years Full Time

University of Northampton

3 years Full Time

University of Northampton

2 years Full Time

University of Glamorgan, Cardiff and Pontypridd

2 years Full Time

University of Glamorgan, Cardiff and Pontypridd

3 years Full Time

University of Glamorgan, Cardiff and Pontypridd

2 years Full Time

Nottingham Trent University

3 years Full Time / 4 years Sandwich Course

University of Greenwich

3 years Full Time

University of Bedfordshire

3 years Full Time

Leeds Metropolitan University

3 years Full Time / 4 years Sandwich Course

Staffordshire University

3 years Full Time / 4 years Sandwich Course

De Montfort University

3 years Full Time / 4 years Sandwich Course

University of West of England

3 years Full Time / 4 years Sandwich Course

Birmingham City University

4 years Full Time / 5 years Sandwich Course

Staffordshire University

3 years Full Time / 4 years Sandwich Course

Staffordshire University

3 years Full Time / 4 years Sandwich Course

DBAPPSecurity

DBAPPSecurity Database Auditor(DBAuditor)helps users to enhance the transparency of database monitoring and reduce the cost of manual auditing so as to visualize database running, monitor daily operation, control dangerous operation, audit all activities ...

Deep Security protects confidential data and critical applications to help prevent data breaches and ensure business continuity, while enabling compliance with important standards and regulations such as PCI, FISMA and HIPAA. Whether implemented as softwa ...

Category IPS Network
Trend Micro Deep Security

Snorby is a ruby on rails web application for network security monitoring that interfaces with current popular intrusion detection systems (Snort, Suricata and Sagan). The basic fundamental concepts behind Snorby are simplicity, organization and power. Th ...

Category IPS Network
SUPERAntiSpyware

Advanced Detection and Removal: Detect and Remove Spyware, Adware and Remove Malware, Trojans, Dialers, Worms, KeyLoggers, HiJackers, Parasites, Rootkits, Rogue Security Products and many other types of threats. Light on System Resources and designed ...

SUPERAntiSpyware