A general purpose proxy filtering mechanism applied to the mobile environment
MobiCom '97 Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking
Design of a high-performance ATM firewall
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Design of a high-performance ATM firewall
ACM Transactions on Information and System Security (TISSEC)
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Programming language optimizations for modular router configurations
Proceedings of the 10th international conference on Architectural support for programming languages and operating systems
Modeling and Simulation for Detecting a Distributed Denial of Service Attack
AI '02 Proceedings of the 15th Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
The information furnace: consolidated home control
Personal and Ubiquitous Computing
Managing information security on a shoestring budget
Annals of cases on information technology
Distinguishing between single and multi-source attacks using signal processing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Tossing Packets Over the Wall Using Transmit-Only Ethernet Cables
LISA '03 Proceedings of the 17th USENIX conference on System administration
Information security education in the UK: a proposed course in secure e-commerce systems
Proceedings of the 1st annual conference on Information security curriculum development
Integrating Portable and Distributed Storage
FAST '04 Proceedings of the 3rd USENIX Conference on File and Storage Technologies
Dynamic rule-ordering optimization for high-speed firewall filtering
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Effects of processing delay on function-parallel firewalls
PDCN'06 Proceedings of the 24th IASTED international conference on Parallel and distributed computing and networks
Using data-independence in the analysis of intrusion detection systems
Theoretical Computer Science - Theoretical foundations of security analysis and design II
Journal of Systems Architecture: the EUROMICRO Journal
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Detailed DoS attacks in wireless networks and countermeasures
International Journal of Ad Hoc and Ubiquitous Computing
Human firewall: case study faculty of economics Babes-Bolyai University, Clujnapoca, Romania
ACC'08 Proceedings of the WSEAS International Conference on Applied Computing Conference
AFPL, an Abstract Language Model for Firewall ACLs
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
A secure mobile agents approach for anomalies detection on firewalls
Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services
Model-Based Development of firewall rule sets: Diagnosing model inconsistencies
Information and Software Technology
Graduate follow up as a vehicle for CSIT curriculum assessment and improvement
Proceedings of the 14th Western Canadian Conference on Computing Education
Security management of mutually trusted domains through cooperation of defensive technologies
International Journal of Network Management
Design of the host guard firewall for network protection
ISP'08 Proceedings of the 7th WSEAS international conference on Information security and privacy
Firewalls - Are they enough protection for current networks?
Information Security Tech. Report
Scalable packet classification through rulebase partitioning using the maximum entropy hashing
IEEE/ACM Transactions on Networking (TON)
Modeling and simulation of distributed security models
ICCS'03 Proceedings of the 2003 international conference on Computational science
Analysis of firewall policy rules using traffic mining techniques
International Journal of Internet Protocol Technology
A study of network security systems
ACS'10 Proceedings of the 10th WSEAS international conference on Applied computer science
Policy segmentation for intelligent firewall testing
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Integrating portable and distributed storage
FAST'04 Proceedings of the 3rd USENIX conference on File and storage technologies
History-based access control for distributed processes
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
Multi-stage packet filtering in network smart cards
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Modeling of policy-based network with SVDB
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
On scalability and modularisation in the modelling of network security systems
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
The Enhancement of Security in Healthcare Information Systems
Journal of Medical Systems
Hi-index | 0.00 |
Completely revised and much expanded, the new edition of the highly respected and bestselling Building Internet Firewalls now covers Unix, Linux, and Windows NT. This practical and detailed guide explains in step-by-step fashion how to design and install firewalls and configure Internet services to work with a firewall. It covers a wide range of services and protocols and offers a complete list of resources, including the location of many publicly available firewalls construction tools.