Sadiqui, 2020 - Google Patents
Computer network securitySadiqui, 2020
- Document ID
- 13298176240301332852
- Author
- Sadiqui A
- Publication year
External Links
- 241001489523 Coregonus artedi 0 abstract description 23
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wack et al. | Guidelines on firewalls and firewall policy | |
Stewart | Network security, firewalls and VPNs | |
Malik | Network security principles and practices | |
Holmberg et al. | BACnet wide area network security threat assessment | |
Rao et al. | Intrusion detection and prevention systems | |
Mohammed et al. | Automatic defense against zero-day polymorphic worms in communication networks | |
Carter et al. | Intrusion prevention fundamentals | |
Chauhan | Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus | |
Sadiqui | Computer network security | |
Buchanan | Introduction to security and network forensics | |
Vachon | CCNA security portable command guide | |
Fink | Lessons learned from cyber security assessments of SCADA and energy management systems | |
Kantheti et al. | Performance and evaluation of firewalls and security | |
Kfouri et al. | Design of a Distributed HIDS for IoT Backbone Components. | |
Karamagi | Comptia Security+ Practice Exams | |
Barrett et al. | CompTIA Security+ SY0-401 Exam Cram | |
Tian et al. | Network Security and Privacy Architecture | |
Ruha | Cybersecurity of computer networks | |
Hausman et al. | CompTIA Security+ SY0-301 Exam Cram | |
BALEMI | BULE HORA UNIVERSIRTY | |
Dao | Research and deploy a network attack detection and warning system using snort | |
NETWORK | HELLENIC REPUBLIC MINISTRY OF DIGITAL GOVERNANCE NATIONAL CYBERSECURITY AUTHORITY | |
Kalyan | What are Cyber-Threats, Cyber-Attacks and how to defend our Systems | |
Gupta et al. | Security Landscape of a Strong Ecosystem to Protect Sensitive Information in E-Governance | |
Rayjada et al. | Analytical Research of Data Center Security Implementations and Cyber Attacks |