Filters








10 Hits in 8.9 sec

Towards IPV6 Adoption in Developing Arab Countries in Western Asia Region

Baha Khasawneh, Batool AlArmouty
2019 International Journal of Technology and Engineering Studies  
Acknowledgements We would like to thank the following people and organizations: The Internet Society (www.isoc.org.) for having donated the funds that allowed this Project to be carried out and for its  ...  constant support in promoting the continuity and relevance of its Chapters.  ...  In the case of infrastructure (configuration of routers, firewalls, databases, management applications), the degradation could be due to an IPv6 connection with excessive delay.  ... 
doi:10.20469/ijtes.5.40004-2 fatcat:iqgvz6bilveplj2yetf7to37l4

Security issues in networks with Internet access

C.E. Landwehr, D.M. Goldschlag
1997 Proceedings of the IEEE  
Firewalls implement this sort of perimeter security and are a prudent component of network security solutions. 3 Landwehr, C.E. and D.M. Goldschlag. Security issues in networks with Internet access.  ...  This version of the paper differs in citation formats, pagination, and other minor details from the published version.  ...  In particular, thanks are due to Alex Scott of the United Kingdom, Vincent Taylor and Paul Devlin of Canada, Peter Drewer of Australia, and John McLean, Michael Harrison, and Dwayne Allain of the US.  ... 
doi:10.1109/5.650183 fatcat:hswaepdykjcizjmsp4gsmnwtc4

API design matters

Michi Henning
2007 Queue  
SIN fOur: INSECURE ANd BAdlY CONfIgUREd PROgRAMS The use of insecure programs (such as PHP, FTP, rsh, NFS, and portmap) in other than carefully controlled situations and failure to configure other programs  ...  HTTP is often used simply because it is perceived to be generally available, and firewalls are often configured to let HTTP traffic pass.  ...  A discussion of typography follows; it controls how text looks on the screen. Zeldman debunks many of the myths surrounding Web accessibility and provides tips for making Web sites more accessible.  ... 
doi:10.1145/1255421.1255422 fatcat:cjpfqt5y35ejbcmkvc24ig2o3y

Intrusion-Detection Systems [chapter]

Peng Ning, Sushil Jajodia
2012 Handbook of Computer Networks  
The scope of this series includes all aspects of computer and network security and related areas such as fault tolerance ADVANCES IN INFORMATION SECURITY aims to publish thorough and cohesive overviews  ...  for advanced and timely topics in information security research and development.  ...  Acknowledgment This work has been partially funded by the Ministero dell'Università e della Ricerca (MiUR) in the framework of the RECIPE Project, and by the EU as part of the IST Programme -within the  ... 
doi:10.1002/9781118256107.ch26 fatcat:aeidzkegvfc27dqqmztiayv3dm

Two bits: the cultural significance of free software

2008 ChoiceReviews  
building quick Internet applications, and a number of other lower-level tools like Bind (an implementation of the DNS protocol) or sendmail for e-mail.  ...  Internet (packet-switched networks and routing systems indifferent to data types), to the standards and protocols that make it work (e.g., TCP/IP or DNS), to the applications that run on it (e-mail, www  ...  His books include Code and Other Laws of Cyber Space, The Future of Ideas, Free Culture, and Code: Version 2.0.  ... 
doi:10.5860/choice.46-2158 fatcat:jtxrurovzvexbm7lslgffroqem

Advanced Information Assurance Handbook

Christopher May, Marie Baker, Derek Gabbard, Travis Good, Galen Grimes, Mark Holmgren, Richard A. Nolan, Sean Pennline
2018
The second module covers the importance of firewalls and provides instructions for their configuration and deployment.  ...  It also discusses the importance of monitoring networked services to make sure they are available to users and briefly introduces two software tools that can be used for monitoring.  ...  The authors gratefully acknowledge the talents of Laura Bentrem and Pamela Williams for their technical editing contributions.  ... 
doi:10.1184/r1/6571844 fatcat:3crkcfsvkjaived6lm2xuoohwy

Firewalls and virtual private networks [article]

B. A. Harris, University Of Canterbury
2014
controlling the content of end-user access (e.g. virus infected files, Java applets, etc.)  ...  The Internet has become a global computing phenomenon, and during the 1990's has had more influence on the computer- communications industry than any other development in its history.  ...  Perhaps I should start with my supervisor and friend, Ray Hunt, who has provided me with unwavering support, encouragement, and of course much needed criticism.  ... 
doi:10.26021/3118 fatcat:oys4slikuzaplgnyv7yyyjt7g4

Firewalls and virtual private networks [article]

B. A. Harris, University Of Canterbury
2013
controlling the content of end-user access (e.g. virus infected files, Java applets, etc.)  ...  The Internet has become a global computing phenomenon, and during the 1990's has had more influence on the computer - communications industry than any other development in its history.  ...  Perhaps I should start with my supervisor and friend, Ray Hunt, who has provided me with unwavering support, encouragement, and of course much needed criticism.  ... 
doi:10.26021/1428 fatcat:tj74fufdxnch7ijm2w6fpsgxey

Foresight: Countering malware through cooperative forensics sharing Foresight: Countering malware through cooperative forensics sharing

Muhammad Zaffar, Gershon Kedem, Jeff Chase, Jun Yang, Miguel Lobo, Wilfred Amaldoss, Muhammad Zaffar, Gershon Kedem, Jeff Chase, Jun Yang, Miguel Lobo, Wilfred Amaldoss
unpublished
Having timely and credible security information is thus becoming critical to network and security management.  ...  A pathogen might infect thousands of machines and cascade across the network producing consequences that could overwhelm the Internet very quickly.  ...  Acknowledgements This effort is dedicated to my wonderful parents Afzal and khalida , my lovely wife Mahira and my siblings, Nausheen, Naveed and Adeel.  ... 
fatcat:2ufldmh3xfbetioiynleuytoui

Proceedings of the International GI Workshop on Detection of Intrusions and Malware & Vulnerability Assessment

Ulrich Flegel, Michael Meier, Technische Universität Dortmund, Technische Universität Dortmund
2006
and Malware.  ...  The workshop program comprised new theoretical and practical approaches and results from research as well as experience reports on the principal topic Intrusion Detection and on the topics Honeypots, Vulnerabilities  ...  Acknowledgment The authors wish to thank the members of the Munich Network Management (MNM) Team for helpful discussions and valuable comments on previous versions of the paper.  ... 
doi:10.17877/de290r-8784 fatcat:qvo5cmghefgqpirbkvbfx2fouu