Internet security attacks at the basic levels
ACM SIGOPS Operating Systems Review
A novel computer architecture to prevent destruction by viruses
Journal of Computer Science and Technology
Interval Weighted Load Balancing Method for Multiple Application Gateway Firewalls
ICCS '02 Proceedings of the International Conference on Computational Science-Part III
PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label
The Journal of Supercomputing
Security Policies Tuning Among IP Devices
KES '07 Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference
The design of secure node system based on integrated security engine (SNSISE)
CIMMACS'05 Proceedings of the 4th WSEAS international conference on Computational intelligence, man-machine systems and cybernetics
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Tutorial: Internet/Intranet firewall security-policy, architecture and transaction services
Computer Communications
Review: TCP/IP security threats and attack methods
Computer Communications
Hi-index | 0.01 |
From the Publisher:This book shows how computer security is implemented and the ways in which it can be side-stepped by trespassers.Details ways to catch hackers and limit their accessVital coverage provided for all Internet and private host sitesCD-ROM includes software from Black Hole allowing users to build their own firewall