Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   12  
      FlashFirewallFirewall and network securityAdobe Flash Player
    • by 
    •   9  
      Computer ScienceComputer EngineeringComputer NetworksTcp/Ip
Even after the adoption of network security policies and practices, unauthorized intrusion occurs. It is an attack in which attacker gets access to the system by means of different hacking and cracking techniques. Firewall is... more
    • by 
    •   8  
      Computer ScienceComputer EngineeringNetwork SecurityComputer Networks
    • by 
    •   11  
      Computer ScienceDoS AttackNetwork ForensicsDigital Forensics
Distributed Denial of Service (DDoS) attack is a growing issue in the Information Age. Following the rise of IPv6 and Internet of Things (IoT), these attacks are undeniably becoming more abusive. Relatively, Domain Name System (DNS)... more
    • by 
    •   4  
      Information SecurityNetwork SecurityWireless Sensor Network SecurityFirewall
    • by 
    •   8  
      Computer ScienceComputer EngineeringNetwork SecurityComputer Networks
    • by 
    •   7  
      LawCensorshipCommunismChina
The use of the Internet has increased in all areas in recent years. With the huge growth and use of the internet increasing, there have been an increase in the number of intrusions and hackers. The risk of intrusion in the network... more
    • by 
    •   6  
      Anomaly DetectionIDSFirewallMisuse Detection
Discussion and analysis of a scenario where a demo web application that acts as a profile manager is assessed from a security point of view. We will design and develop the test web application and we will perform a vulnerability... more
    • by 
    •   31  
      Information TechnologyInformation SecurityNetwork SecuritySecurity
    • by 
    •   16  
      Network SecurityFirewallFirewall and network securityTeknik Informatika
    • by 
    •   2  
      Structural Fire SafetyFirewall
Đối với những nhà xưởng, công ty lớn, thậm chí cả hộ gia đình, ngoài việc cần trang bị bình chữa cháy cũng nên có thêm một bộ bảng nội quy tiêu lệnh PCCC như hình bên dưới :
    • by 
    •   9  
      Fire and Emergency ServicesFire EcologyFire ProtectionStructures and Fire Engineering
Configuring Juniper Networks NetScreen and SSG Firewalls
    • by 
    •   2  
      FirewallJuniper Routing
Firewalls are computer security systems that protect your office/home PCs or your network from intruders, hackers & malicious code. Firewalls protect you from offensive software that may come to reside on your systems or from prying... more
    • by 
    •   5  
      Computer ScienceInformation SecurityNetwork SecurityFirewall
Este trabalho tem como escopo demonstrar através de implementação a utilização do software PacketFence para controlar o acesso de novos dispositivos (Notebook, Desktop) à infraestrutura de rede de computadores utilizando conexões Ethernet... more
    • by 
    •   7  
      FirewallFingerprintSNORT IDS NetworkPortal Captive
    • by 
    •   11  
      Computer NetworksWireless networksResource useVirtual Private Network
    • by  and +1
    •   7  
      VulnerabilityFirewallResearch PaperThreat
    • by 
    •   6  
      Network SecurityRisk assessmentFirewallSecurity Policy
Abstract-Web application security is the hottest issue in the present scenario of e-business environment. Web application attacks can play havoc with the system within no time. More than 80% attacks are at application layer and almost 90%... more
    • by 
    •   20  
      Information TechnologyService Oriented ArchitectureComputer SecurityDatabases
This article paper is one of the “Most Read” in the LinkedIn Publishing platform, which has been made and provides a course background based on hands-on experiences with the requirement of Fire System Design and Analysis as part of the... more
    • by 
    •   16  
      Building Information ModelingFire BehaviourStructural Fire SafetyMaterials Science and Engineering
Firewalls are one of the major products in the network and Internet security arsenal. No satisfactory criterion is currently available for evaluating firewalls. This paper enumerates considerations that have to be taken into account in... more
    • by 
    • Firewall
NIST created the Cyber Security Framework in 2017 to serve as an implementation vehicle to address requirements of an Obama Administration Executive order. I provided feedback to NIST on the CSF development. I have deployed the CSF core... more
    • by 
    •   13  
      Information SecurityCISACyber SecurityFirewall
RESUMEN: ​ Zentyal se define como una solución de groupware de código abierto, desarrollada como un sistema operativo linux pero compatible con clientes Microsoft. Zentyal tiene distribuciones gratuitas y de pago. La versión gratuita se... more
    • by 
    •   2  
      LinuxFirewall
    • by 
    •   9  
      AlgebraComputer ScienceProgramming LanguagesChemistry
    • by 
    • Firewall
MAkalah tentang firewall
    • by 
    • Firewall
FreeBSD is often used as a router or a firewall, but the vast majority of tuning guides available for this use case doesn't explain in detail how to calculate each value to be tuned. This study, after describing how to bench a router and... more
    • by 
    •   5  
      Computer NetworksOpen Source SoftwareRouting and SwitchingUnix OS(FreeBSD)
    • by 
    •   8  
      Computer ScienceComputer EngineeringNetwork SecurityComputer Networks
High availability (HA) refers to systems that are likely to operate continuously without failure for a long time. HA can be achieved by creating a cluster of computers that act like a single system and provide continuous uptime. Several... more
    • by 
    •   6  
      Computer NetworksSecurityWeb TechnologiesComputer Hardware and Networking
    • by 
    •   10  
      Computer ScienceComputer EngineeringComputer NetworksSql Injection
The purpose of the following white paper is to present a set of well- investigated internet traffic security guidelines and best practices which others can use as a basis for future standards, certifications, laws, policies and/or product... more
    • by  and +3
    •   41  
      Information TechnologyTechnologyInformation SecurityNetwork Security
    • by 
    •   6  
      Network SecurityFirewallIptablesKeamanan Jaringan
Dalam hal pengelolaan server, biasanya administrator sistem tidak selalu harus berada dalam ruang server. Hal ini karena biasanya ruangan server dirancang agar memiliki suhu yang cukup dingin dan stabil, dimana hal itu tentu kurang baik... more
    • by 
    •   3  
      FirewallLinux Servers & VPS ServersPort Knocking
    • by 
    •   8  
      Computer ArchitectureTopologyControl SystemsOpenFlow
KEAMANAN JARINGAN DAN FIREWALL
    • by 
    •   2  
      FirewallKeamanan Jaringan
Firewall
    • by 
    • Firewall
The principles of security threats prevent inappropriate access, modification or manipulation of data from taking place. The chapter focuses on Information security threats principle components as well as the security. The comprehensive... more
    • by 
    •   16  
      Computer ScienceRobotics (Computer Science)Information TechnologyTechnology
The multiple interconnections and the heterogeneity of the devices and technologies into the Smart Grid (SG) generate possible cyber-physical security vulnerabilities that can be exploited by various cyberattackers. The cyberattacks in... more
    • by  and +3
    •   7  
      SecuritySmart GridSCADAFirewall
    • by 
    •   32  
      Distributed ComputingInformation TheoryInternet SecurityDistributed Denial of Service Attack
    • by 
    •   2  
      FirewallIptables
    • by 
    •   12  
      Computer ScienceWireless CommunicationsComputer NetworksClass
    • by 
    •   9  
      PrivacyBiometricsEncryptionAudit
This paper describes an approach to detecting distributed denial of service (DDoS) attacks that is based on fundamentals of Information Theory, specifically Kolmogorov Complexity. A theorem derived using principles of Kolmogorov... more
    • by 
    •   32  
      Distributed ComputingInformation TheoryInternet SecurityDistributed Denial of Service Attack
    • by 
    •   5  
      FirewallPENSKeamanan JaringanLAPRES
    • by 
    •   4  
      FirewallPortIptablesPort Knocking
Understanding the conceptual fundamentals of Firewall policies are the basic terms to be considered. Developing an algorithm to detect and resolve anomalies comes after. From the basic conception to complex design, this report focuses on... more
    • by 
    •   3  
      FirewallFirewall and network securityFirewall Rules Generation
Jupyter notebooks, formerly known as iPython notebooks, are widely used for data analysis and other areas of scientific computing. Notebooks can contain formatted text, images, LaTeX formulas, as well as code that can be executed, edited... more
    • by 
    •   19  
      Computational PhysicsBiomedicineData AnalysisSecurity
Network Firewalls are considered to be one of the most important security components in today's IP network architectures. Performance of firewalls has significant impact on the overall network performance. Firewalls should be able to... more
    • by  and +1
    •   2  
      Network SecurityFirewall
Chinese authorities ordered deletion of a 4 May 2020 speech, given in Mandarin, by Deputy National Security Advisor Matthew Pottinger, from China's internet. The decision opens a window on the Chinese party-state's practice of... more
    • by 
    •   15  
      CensorshipPublic DiplomacyChinaMay Fourth Movement