by
Çakı, Oğuzhan.
Format:
Manuscript
Excerpt:
Firewall(Computer security)
by
Kaya, Özgür.
Format:
Manuscript
Excerpt:
security level is determined by a policy and implemented by a firewall which not only has to be effective
View Other Search Results
by
Kizza, Joseph Migga.
Chapter PDFs via platform: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-379-1
Format:
Electronic Resources
Excerpt:
.Security threats and vulnerabilities --8. Security policies and risk analysis -- 9. Security analysis
by
R. Rowlingson, Robert.
Format:
Electronic Resources
Excerpt:
INFORMATION SECURITY -- WHAT IS INFORMATION SECURITY? -- PRINCIPLES OF GOOD SECURITY -- COUNTERMEASURES
by
Mohammed, Mohssen, 1982- author.
Format:
Electronic Resources
Excerpt:
Honeypots<BR>Conclusion<BR>References <BR><BR><B>Security Systems<BR></B>Firewall<BR>Antivirus<BR>Intrusion
by
Asarcıklı, Şükran.
Format:
Manuscript
Excerpt:
Internet. However, Internet is inherently an insecure network. That makes the security of the computer
by
Sagers, Glen., author.
Format:
Electronic Resources
Excerpt:
information systems. The same principles that guide IT security in the enterprise guide smaller organizations
by
Strebe, Matthew.
Format:
Electronic Resources
Excerpt:
Security -- Principles of Border Security -- Understanding Firewalls -- Selecting a Firewall -- Chapter 6
by
Qing, Sihan. editor.
Format:
Electronic Resources
Excerpt:
Honeypots -- Network Security -- DDoS Attack Detection Algorithms Based on Entropy Computing -- Firewall for
by
Salomon, David. author.
Format:
Electronic Resources
Excerpt:
All aspects of computer security—from the firewall for a home PC to the most daunting designs for
by
Liu, Alex X.
Format:
Electronic Resources
Excerpt:
. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-prone
by
Sinclair, Ian.
Format:
Electronic Resources
Excerpt:
solutions (wired and wireless) Security technologies, including Firewall Troubleshooting installation
Limit Search Results