Network security tools-firewall / Ding Khoon Chong
A firewall is a system or group of systems that enforces an access control policy between two or more networks. The actual means by which this is accomplished varies widely, but in principle, the firewall can be thought of as pair of mechanisms: one which exists to block traffic, and the other which...
| Main Author: | Ding, Khoon Chong |
|---|---|
| Format: | Thesis |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/10264/ http://studentsrepo.um.edu.my/10264/1/Ding_Khoon_Chong_(Network_Security_Tools%2D_Fire_Wall).pdf |
Similar Items
Packet sniffer & analyzer / Ong Khoon Kok
by: Ong , Khoon Kok
Published: (2000)
by: Ong , Khoon Kok
Published: (2000)
Data Security Analysis with Advanced Firewall Filtering at PT PUSRI
by: Misinem, ., et al.
Published: (2024)
by: Misinem, ., et al.
Published: (2024)
Review of firewall optimization techniques
by: Shakirah, Saidin, et al.
Published: (2018)
by: Shakirah, Saidin, et al.
Published: (2018)
Agent for exam processing / Chong Foh Peng
by: Chong, Foh Peng
Published: (2001)
by: Chong, Foh Peng
Published: (2001)
Automated essay grading system / Chong Theng Hui
by: Chong , Theng Hui
Published: (2005)
by: Chong , Theng Hui
Published: (2005)
A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall
by: A., Fairuzullah, et al.
by: A., Fairuzullah, et al.
Design and Implementation of an XML Firewall
by: Loh, Yin-soon, et al.
Published: (2006)
by: Loh, Yin-soon, et al.
Published: (2006)
Web information retrieval and monitoring using adaptive agent / Chong Yuen Beng
by: Chong, Yuen Beng
Published: (2001)
by: Chong, Yuen Beng
Published: (2001)
Personal computer checker/ Chong Fah Sam
by: Chong , Fah Sam
Published: (2005)
by: Chong , Fah Sam
Published: (2005)
PESAT application Personal Security Administrator Tool / Law Yong Jin
by: Law , Yong Jin
Published: (2004)
by: Law , Yong Jin
Published: (2004)
Software defined networking (SDN) and its security issues
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
Online whiteboard / Chong Bing Suang
by: Chong, Bing Suang
Published: (2001)
by: Chong, Bing Suang
Published: (2001)
Family information system / Che Chong Lee
by: Che, Chong Lee
Published: (2002)
by: Che, Chong Lee
Published: (2002)
Simulation technologies in networking and communications: selecting the best tool for the test
Published: (2015)
Published: (2015)
Automated intrusion prevention mechanism in enhancing network security / He Xiao Dong
by: He , Xiao Dong
Published: (2008)
by: He , Xiao Dong
Published: (2008)
e-Expense Claims System / Chong Chee Fui
by: Chong , Chee Fui
Published: (2001)
by: Chong , Chee Fui
Published: (2001)
Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong
by: Chong, Chun Yong
Published: (2016)
by: Chong, Chun Yong
Published: (2016)
Sistem penjadualan perjalanan bas elektronik Puduraya / Chong Shi Leng
by: Chong , Shi Leng
Published: (2000)
by: Chong , Shi Leng
Published: (2000)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
INTI International University Campus (INTI-IU) Security Monitoring System With Face Recognition Technology
by: Yap, Choi Sen, et al.
Published: (2020)
by: Yap, Choi Sen, et al.
Published: (2020)
A Convolutional Neural Network (CNN) Classification Model for Web Page: A Tool for Improving Web Page Category Detection Accuracy
by: Siti Hawa, Apandi, et al.
Published: (2023)
by: Siti Hawa, Apandi, et al.
Published: (2023)
An online tool for Metagenomics analysis
by: Phong, Cheralyn Jia Ern
Published: (2018)
by: Phong, Cheralyn Jia Ern
Published: (2018)
Virtual solar system / Chong Yee Wah
by: Chong, Yee Wah
Published: (2004)
by: Chong, Yee Wah
Published: (2004)
Web-based internet security / Zuriani Karia
by: Zuriani, Karia
Published: (2003)
by: Zuriani, Karia
Published: (2003)
Anti-theft security system using face recognition
by: Chong, Guang Yu
Published: (2018)
by: Chong, Guang Yu
Published: (2018)
Firewall Redundancy Rules Filtering Using Integrity Rules Checking
by: Zarina, Dzolkhifli, et al.
Published: (2018)
by: Zarina, Dzolkhifli, et al.
Published: (2018)
Requirements management tools / Ameran Jaffar
by: Ameran, Jaffar
Published: (2004)
by: Ameran, Jaffar
Published: (2004)
A Survey of Petri Net Tools
by: Thong, Weng Jie, et al.
Published: (2015)
by: Thong, Weng Jie, et al.
Published: (2015)
Interactive online tool for methylation studies
by: Cheah, Zhao Qin
Published: (2018)
by: Cheah, Zhao Qin
Published: (2018)
Enhancement of multicast network security
by: Ali, Sellami, et al.
Published: (2013)
by: Ali, Sellami, et al.
Published: (2013)
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
Analysis of Information Security Resource Requirements in Local Governments
by: Toto, Suharto, et al.
Published: (2022)
by: Toto, Suharto, et al.
Published: (2022)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
VAP Code: A Secure Graphical Password for Smart Devices
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
Self-organizing kernel-based convolutional echo state network for human action recognition / Lee Gin Chong
by: Lee , Gin Chong
Published: (2022)
by: Lee , Gin Chong
Published: (2022)
Dynamic threshold and quality meter based routing for cooperative broadband wireless networks
by: Chong, Eng Tan, et al.
Published: (2009)
by: Chong, Eng Tan, et al.
Published: (2009)
Implementation of a MIS tool based on open XML
by: Baniani, Behdad
Published: (2009)
by: Baniani, Behdad
Published: (2009)
An advanced and secure framework for conducting online examination using blockchain method
by: Sattar, Md Rahat Ibne, et al.
Published: (2023)
by: Sattar, Md Rahat Ibne, et al.
Published: (2023)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
Tools for collaborative software inspection management / Lai Poh Fatt
by: Lai , Poh Fatt
Published: (2005)
by: Lai , Poh Fatt
Published: (2005)
Similar Items
-
Packet sniffer & analyzer / Ong Khoon Kok
by: Ong , Khoon Kok
Published: (2000) -
Data Security Analysis with Advanced Firewall Filtering at PT PUSRI
by: Misinem, ., et al.
Published: (2024) -
Review of firewall optimization techniques
by: Shakirah, Saidin, et al.
Published: (2018) -
Agent for exam processing / Chong Foh Peng
by: Chong, Foh Peng
Published: (2001) -
Automated essay grading system / Chong Theng Hui
by: Chong , Theng Hui
Published: (2005)