A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Towards IPV6 Adoption in Developing Arab Countries in Western Asia Region
2019
International Journal of Technology and Engineering Studies
Acknowledgements We would like to thank the following people and organizations: The Internet Society (www.isoc.org.) for having donated the funds that allowed this Project to be carried out and for its ...
constant support in promoting the continuity and relevance of its Chapters. ...
In the case of infrastructure (configuration of routers, firewalls, databases, management applications), the degradation could be due to an IPv6 connection with excessive delay. ...
doi:10.20469/ijtes.5.40004-2
fatcat:iqgvz6bilveplj2yetf7to37l4
Security issues in networks with Internet access
1997
Proceedings of the IEEE
Firewalls implement this sort of perimeter security and are a prudent component of network security solutions. 3 Landwehr, C.E. and D.M. Goldschlag. Security issues in networks with Internet access. ...
This version of the paper differs in citation formats, pagination, and other minor details from the published version. ...
In particular, thanks are due to Alex Scott of the United Kingdom, Vincent Taylor and Paul Devlin of Canada, Peter Drewer of Australia, and John McLean, Michael Harrison, and Dwayne Allain of the US. ...
doi:10.1109/5.650183
fatcat:hswaepdykjcizjmsp4gsmnwtc4
API design matters
2007
Queue
SIN fOur: INSECURE ANd BAdlY CONfIgUREd PROgRAMS The use of insecure programs (such as PHP, FTP, rsh, NFS, and portmap) in other than carefully controlled situations and failure to configure other programs ...
HTTP is often used simply because it is perceived to be generally available, and firewalls are often configured to let HTTP traffic pass. ...
A discussion of typography follows; it controls how text looks on the screen. Zeldman debunks many of the myths surrounding Web accessibility and provides tips for making Web sites more accessible. ...
doi:10.1145/1255421.1255422
fatcat:cjpfqt5y35ejbcmkvc24ig2o3y
Intrusion-Detection Systems
[chapter]
2012
Handbook of Computer Networks
The scope of this series includes all aspects of computer and network security and related areas such as fault tolerance ADVANCES IN INFORMATION SECURITY aims to publish thorough and cohesive overviews ...
for advanced and timely topics in information security research and development. ...
Acknowledgment This work has been partially funded by the Ministero dell'Università e della Ricerca (MiUR) in the framework of the RECIPE Project, and by the EU as part of the IST Programme -within the ...
doi:10.1002/9781118256107.ch26
fatcat:aeidzkegvfc27dqqmztiayv3dm
Two bits: the cultural significance of free software
2008
ChoiceReviews
building quick Internet applications, and a number of other lower-level tools like Bind (an implementation of the DNS protocol) or sendmail for e-mail. ...
Internet (packet-switched networks and routing systems indifferent to data types), to the standards and protocols that make it work (e.g., TCP/IP or DNS), to the applications that run on it (e-mail, www ...
His books include Code and Other Laws of Cyber Space, The Future of Ideas, Free Culture, and Code: Version 2.0. ...
doi:10.5860/choice.46-2158
fatcat:jtxrurovzvexbm7lslgffroqem
Advanced Information Assurance Handbook
2018
The second module covers the importance of firewalls and provides instructions for their configuration and deployment. ...
It also discusses the importance of monitoring networked services to make sure they are available to users and briefly introduces two software tools that can be used for monitoring. ...
The authors gratefully acknowledge the talents of Laura Bentrem and Pamela Williams for their technical editing contributions. ...
doi:10.1184/r1/6571844
fatcat:3crkcfsvkjaived6lm2xuoohwy
Firewalls and virtual private networks
[article]
2014
controlling the content of end-user access (e.g. virus infected files, Java applets, etc.) ...
The Internet has become a global computing phenomenon, and during the 1990's has had more influence on the computer- communications industry than any other development in its history. ...
Perhaps I should start with my supervisor and friend, Ray Hunt, who has provided me with unwavering support, encouragement, and of course much needed criticism. ...
doi:10.26021/3118
fatcat:oys4slikuzaplgnyv7yyyjt7g4
Firewalls and virtual private networks
[article]
2013
controlling the content of end-user access (e.g. virus infected files, Java applets, etc.) ...
The Internet has become a global computing phenomenon, and during the 1990's has had more influence on the computer - communications industry than any other development in its history. ...
Perhaps I should start with my supervisor and friend, Ray Hunt, who has provided me with unwavering support, encouragement, and of course much needed criticism. ...
doi:10.26021/1428
fatcat:tj74fufdxnch7ijm2w6fpsgxey
Foresight: Countering malware through cooperative forensics sharing Foresight: Countering malware through cooperative forensics sharing
unpublished
Having timely and credible security information is thus becoming critical to network and security management. ...
A pathogen might infect thousands of machines and cascade across the network producing consequences that could overwhelm the Internet very quickly. ...
Acknowledgements This effort is dedicated to my wonderful parents Afzal and khalida , my lovely wife Mahira and my siblings, Nausheen, Naveed and Adeel. ...
fatcat:2ufldmh3xfbetioiynleuytoui
Proceedings of the International GI Workshop on Detection of Intrusions and Malware & Vulnerability Assessment
2006
and Malware. ...
The workshop program comprised new theoretical and practical approaches and results from research as well as experience reports on the principal topic Intrusion Detection and on the topics Honeypots, Vulnerabilities ...
Acknowledgment The authors wish to thank the members of the Munich Network Management (MNM) Team for helpful discussions and valuable comments on previous versions of the paper. ...
doi:10.17877/de290r-8784
fatcat:qvo5cmghefgqpirbkvbfx2fouu