Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   12  
      FlashFirewallFirewall and network securityAdobe Flash Player
    • by 
    •   3  
      Network SecurityCloud ComputingFirewall and network security
    • by 
    • Firewall and network security
    • by 
    •   16  
      Network SecurityFirewallFirewall and network securityTeknik Informatika
Firewalls are computer security systems that protect your office/home PCs or your network from intruders, hackers & malicious code. Firewalls protect you from offensive software that may come to reside on your systems or from prying... more
    • by 
    •   5  
      Computer ScienceInformation SecurityNetwork SecurityFirewall
Perkembangan internet yang pesat memicu banyaknya cyber-threat yang semakin masif. Tanpa adanya peningkatan keamanan, terutama dari sisi infrastruktur, bisa menyebabkan hal-hal yang tidak diinginkan oleh operator seluler seperti... more
    • by  and +1
    •   2  
      Cyber SecurityFirewall and network security
This is analysis of China’s “Great Cannon,” our term for an attack tool that we identify as separate from, but co-located with, the Great Firewall of China. The first known usage of the Great Cannon is in the recent large-scale novel DDoS... more
    • by 
    •   12  
      Internet SecurityDistributed Denial of Service AttackChinaChina Going Global
Network traffic generation is one of the primary techniques that is used to design and analyze the performance of network security systems. However, due to the diversity of IoT networks in terms of devices, applications and protocols, the... more
    • by  and +1
    •   7  
      Artificial IntelligenceNetwork SecurityWireless Sensor NetworksNetwork Intrusion Detection & Prevention
OVERVIEW Successful completion of this three-day, instructor-led course will enable the student to install, configure, and manage the entire line of Palo Alto Networks ® Next-Generation firewalls. COURSE OBJECTIVES Students attending this... more
    • by 
    • Firewall and network security
Writing programs (or programming) is a very creative and rewarding activity. You can write programs for many reasons, ranging from making your living to solving a difficult data analysis problem to having fun to helping someone else solve... more
    • by 
    •   20  
      Shell ScriptingCiscoLoad BalancingCisco Networking
    • by 
    •   14  
      Computer ScienceInformation SecurityNetwork SecurityComputer Networks
This article paper is one of the “Most Read” in the LinkedIn Publishing platform, which has been made and provides a course background based on hands-on experiences with the requirement of Fire System Design and Analysis as part of the... more
    • by 
    •   16  
      Building Information ModelingFire BehaviourStructural Fire SafetyMaterials Science and Engineering
Software-Defined-Networking (SDN) has been recently arising as a new technology in the IT industry. It is a network architecture that hopes to provide better solutions to most of the constraints in contemporary networks. SDN is a... more
    • by 
    •   5  
      Network SecurityOpenFlowDeep Packet InspectionFirewall and network security
International Journal of Wireless Network Security (IJWNS) http://flyccs.com/jounals/IJWNS/Home.html Scope International Journal of Wireless Network Security (IJWNS) is a open access journal that publishes articles which contribute... more
    • by 
    •   18  
      Network SecurityGenetic Fuzzy SystemsFuzzy SystemsWireless Sensor Network Security
The purpose of the following white paper is to present a set of well- investigated internet traffic security guidelines and best practices which others can use as a basis for future standards, certifications, laws, policies and/or product... more
    • by  and +3
    •   41  
      Information TechnologyTechnologyInformation SecurityNetwork Security
    • by 
    •   4  
      Information SecurityNetwork SecurityComputer SecurityFirewall and network security
Panduan konfigurasi iptables
    • by 
    • Firewall and network security
Security Assessment Pada Jaringan Private Wireless LAN
    • by 
    •   7  
      Network SecurityWireless Network SecurityAnti Hacking and security programmes in Operationg systemFirewall and network security
Wireless communications, nowadays, becomes a vital element of people's daily life. Providing global connectivity in future communication systems via the heterogeneous network opens up many research topics to investigate potentialities,... more
    • by 
    •   19  
      Wireless CommunicationsNetwork SecurityComputer NetworksWireless Sensor Network Security
Information Systems and Networks are subject to electronic attacks. Attempts to breach information security are rising every day, along with the availability of the Vulnerability Assessment tools that are widely available on the... more
    • by 
    •   3  
      Intrusion Detection SystemsNetwork Intrusion Detection & PreventionFirewall and network security
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal... more
    • by 
    •   52  
      Wireless CommunicationsNetwork SecuritySensor Network SecurityNext Generation Internet Research
The principles of security threats prevent inappropriate access, modification or manipulation of data from taking place. The chapter focuses on Information security threats principle components as well as the security. The comprehensive... more
    • by 
    •   16  
      Computer ScienceRobotics (Computer Science)Information TechnologyTechnology
    • by 
    • Firewall and network security
    • by 
    • Firewall and network security
Secure Shell (SSH) is a secure remote login program which can be used in place of regular telnet. It has become the default remote access method for administration of UNIX systems. It is very common for public Internet facing servers to... more
    • by 
    •   4  
      Firewall and network securityInternet of Things (IoT)IptablesSsh Tunnel
Understanding the conceptual fundamentals of Firewall policies are the basic terms to be considered. Developing an algorithm to detect and resolve anomalies comes after. From the basic conception to complex design, this report focuses on... more
    • by 
    •   3  
      FirewallFirewall and network securityFirewall Rules Generation
    • by 
    •   4  
      Intrusion Detection SystemsCritical Infrastructure SecurityPLC and SCADA based papersFirewall and network security
A data center is an infrastructure that supports Internet service. Cloud computing is rapidly changing the face of the Internet service infrastructure, enabling even small organizations to quickly build Web and mobile applications for... more
    • by 
    •   6  
      Network SecurityDeep Packet InspectionIntrusion Detection Systems (IDSs)Firewall and network security
前言
历史的回顾
城市保卫战和企业网络防卫
安全市场,产品和技术综述
挑战,机会和创新
趋势和热点
后语
    • by 
    •   7  
      EntrepreneurshipNetwork SecurityIntrusion Detection SystemsInvestment
This paper is a survey of the work, done for making an IDS fault tolerant. Architecture of IDS that uses mobile Agent provides higher scalability. Mobile Agent uses Platform for detecting Intrusions using filter Agent, co-relater agent,... more
    • by 
    •   16  
      Distributed ComputingNetwork SecurityIntrusion Detection SystemsWireless Sensor Network Security
    • by 
    •   2  
      Network SecurityFirewall and network security
    • by 
    • Firewall and network security
Firewalls are extremely effective at enforcing security policies in wired networks. Perhaps surprisingly, firewalls are entirely nonexistent in the wireless domain. Yet, the need to selectively control and block radio communication is... more
    • by 
    •   6  
      Wireless CommunicationsWireless Sensor NetworksWireless Sensor Network SecurityWireless networks
The defense system against servers is generally still done manually by administrators. To overcome this, we need a system that functions to inform threats that occur optimally and be resolved quickly. The IDS network security system was... more
    • by 
    •   5  
      Computer EngineeringNetwork SecurityComputer NetworksNetworking
In the era of information technology and connected world, detecting malware has been a major security concern for individuals, companies and even for states. The New generation of malware samples upgraded with advanced protection... more
    • by  and +1
    •   49  
      Mining EngineeringInformation SecurityData MiningNetwork Security
A selective forwarding attack in mobile wireless sensor networks is an attack that selectively drops or delivers event packets as the compromised node moves. In such an attack, it is difficult to detect the compromised node compared with... more
    • by 
    •   20  
      Network SecurityFuzzy LogicFuzzy Logic ControlComputer and Network Security
Chinese authorities have regulated the Internet since the early days of the country going online. The government’s efforts to regulate and control the development of networked communications have been famously paralleled to the... more
    • by 
    •   18  
      CensorshipCyberlawControlInternet Governance
Zone firewall adalah lingkungan jaringan di kelompokan serta mempunya rule dan di pantau secara real time dan terkordinasi untuk terhubung 1 sama lain secara external maupun internal Zone-zone yang termasuk dan di lindungi/saring dalam... more
    • by 
    • Firewall and network security
    • by 
    •   16  
      Computer ScienceDistributed ComputingNetwork SecuritySoftware Architecture
    • by 
    •   4  
      Innovation statisticsSilicon ValleyEnterpreneurshipFirewall and network security
    • by 
    • Firewall and network security
The security of Critical Infrastructures has become a prominent problem with the advent of modern ICT technologies used to improve the performance and the features of Process Control Systems. Several scientific works have showed how... more
    • by 
    •   4  
      Intrusion Detection SystemsCritical Infrastructure SecurityPLC and SCADA based papersFirewall and network security
Firewall merupakan alat untuk mengimplementasikan kebijakan security (security policy). Sedangkan kebijakan security, dibuat berdasarkan pertimbangan antara fasilitas yang disediakan dengan implikasi security-nya. Adapun yang dibahas... more
    • by 
    •   19  
      Information TechnologyTugas kuliahFirewallFirewall and network security
14 th International Conference on Networks & Communications (NeCoM 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Networks & Data Communications.... more
    • by 
    •   14  
      Wireless Sensor Network SecurityNetwork Security (Networks)Networks SecurityComputer and Network Security Information Assurance and Security Cyber Security Access Control in Collaborative, Mobile, Pervasive and Grid Systems Semantic Web and Security Ontologies
Add some rule on firewall
    • by 
    •   11  
      Computers and Networks EngineeringVMWareLaporanDebian (Linux)
    • by 
    •   36  
      Computer Security And ReliabilityNetwork SecurityComputer SecurityUsable Security (Computer Security)
A Prefeitura Municipal de Cuiabá possui uma rede metropolitana baseada nas tecnologias de redes sem fio WiMAX. Através dessa rede, as secretarias municipais, creches, escolas, hospitais e centros de saúde têm acesso à internet e aos... more
    • by 
    •   6  
      Computer NetworksOpen Source SoftwareSmart GridSmart Cities
    • by 
    •   4  
      FirewallFirewall and network securityFerry AstikaPoliteknik Elektronik Negeri Surabaya