Firewalls offer stronger defences
| Format: | Article |
|---|---|
| Language: | English |
| Published: |
The Star
2008
|
| Subjects: | |
| Online Access: | http://dspace.unimap.edu.my/123456789/260 |
Similar Items
Safeguarding your PC
Published: (2008)
Published: (2008)
Vista : In Or Out ?
Published: (2008)
Published: (2008)
Making Windows XP more like Vista
Published: (2008)
Published: (2008)
An Integrated Firewall System Model In A Multiclient-Server Environment
by: Al-Kazwini, Hussein A. Taqi
Published: (2005)
by: Al-Kazwini, Hussein A. Taqi
Published: (2005)
Review of firewall optimization techniques
by: Shakirah, Saidin, et al.
Published: (2018)
by: Shakirah, Saidin, et al.
Published: (2018)
Network security tools-firewall / Ding Khoon Chong
by: Ding, Khoon Chong
Published: (2005)
by: Ding, Khoon Chong
Published: (2005)
Design and Implementation of an XML Firewall
by: Loh, Yin-soon, et al.
Published: (2006)
by: Loh, Yin-soon, et al.
Published: (2006)
Komputer forensik
Published: (2010)
Published: (2010)
A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall
by: A., Fairuzullah, et al.
by: A., Fairuzullah, et al.
Web application firewall / Mohd Ikram Rahimi
by: Rahimi, Mohd Ikram
Published: (2006)
by: Rahimi, Mohd Ikram
Published: (2006)
Data Security Analysis with Advanced Firewall Filtering at PT PUSRI
by: Misinem, ., et al.
Published: (2024)
by: Misinem, ., et al.
Published: (2024)
Firewall Redundancy Rules Filtering Using Integrity Rules Checking
by: Zarina, Dzolkhifli, et al.
Published: (2018)
by: Zarina, Dzolkhifli, et al.
Published: (2018)
Operating system kernel malware characterization using data-centric approach
by: Mohamad Har, Harmi Armira
Published: (2018)
by: Mohamad Har, Harmi Armira
Published: (2018)
The performance of New Zealand initial public offerings (IPOs): 1995-2000 / Arizza Sapuan
by: Sapuan, Arizza
Published: (2004)
by: Sapuan, Arizza
Published: (2004)
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024)
by: Hydara, Isatou
Published: (2024)
Does high e-government adoption assure stronger security? A cross-country analysis of Australia and Thailand.
by: Thompson, Nik, et al.
Published: (2019)
by: Thompson, Nik, et al.
Published: (2019)
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014)
by: Memari, Nogol
Published: (2014)
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
by: Mohd Nasir, Rinie Narinie
Published: (2015)
by: Mohd Nasir, Rinie Narinie
Published: (2015)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
Performance of Initial Public Offerings of Government Linked and Private Companies in Malaysia
by: Ahmad, Norzalina
Published: (2003)
by: Ahmad, Norzalina
Published: (2003)
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
by: Alomari, Mohammad Ahmed Mohammad
Published: (2017)
by: Alomari, Mohammad Ahmed Mohammad
Published: (2017)
Rescue 991: The Malaysian Civil Defence Emergency System
/ Siti Azrin Abdul Aziz
by: Siti Azrin, Abdul Aziz
Published: (2001)
by: Siti Azrin, Abdul Aziz
Published: (2001)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
by: Mohamed, Amir Mohamed Talib
Published: (2012)
by: Mohamed, Amir Mohamed Talib
Published: (2012)
Kesedaran dan Amalan Keselamatan Komputer dan Internet di Kalangan Pegawai dan Penolong Pegawai Sistem Maklumat di Lima Kementerian Persekutuan di Malaysia
by: Kim, Ching Thoo
Published: (2002)
by: Kim, Ching Thoo
Published: (2002)
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011)
by: Mandangan, Arif
Published: (2011)
Fake review annotation model and classification through reviewers' writing style
by: Shojaee, Somayeh
Published: (2019)
by: Shojaee, Somayeh
Published: (2019)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
by: Ismail, Haqi Khalid
Published: (2021)
by: Ismail, Haqi Khalid
Published: (2021)
A comparison of different technique in flow based anomaly detection
by: Salah, Mohammad
Published: (2017)
by: Salah, Mohammad
Published: (2017)
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016)
by: Abbas, Borkan Ahmed
Published: (2016)
PiWall as a home traffic controller: enabling parental control and monitoring
by: Abd Razak, Nurul Imanina, et al.
Published: (2024)
by: Abd Razak, Nurul Imanina, et al.
Published: (2024)
Blueprint for stronger silver support
by: Vethasalam, Ragananthini, et al.
Published: (2025)
by: Vethasalam, Ragananthini, et al.
Published: (2025)
Security alert framework using dynamic tweet-based features for phishing detection on twitter
by: Liew, Seow Wooi
Published: (2019)
by: Liew, Seow Wooi
Published: (2019)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Enhanced cuckoo malware analysis performance using cloud computing
by: Barakat, Osamah Lutf Hamood
Published: (2013)
by: Barakat, Osamah Lutf Hamood
Published: (2013)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
by: Hydara, Isatou
Published: (2015)
by: Hydara, Isatou
Published: (2015)
Scientific forensic framework for smartphones
by: Shahpasand, Maryam
Published: (2015)
by: Shahpasand, Maryam
Published: (2015)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Similar Items
-
Safeguarding your PC
Published: (2008) -
Vista : In Or Out ?
Published: (2008) -
Making Windows XP more like Vista
Published: (2008) -
An Integrated Firewall System Model In A Multiclient-Server Environment
by: Al-Kazwini, Hussein A. Taqi
Published: (2005) -
Review of firewall optimization techniques
by: Shakirah, Saidin, et al.
Published: (2018)