Skip to content
VuFind
Advanced
  • Firewall Redundancy Rules Filt...
  • Cite this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
  • Permanent link
Firewall Redundancy Rules Filtering Using Integrity Rules Checking

Firewall Redundancy Rules Filtering Using Integrity Rules Checking

Securing your network plays a very crucial role in organizations, institutions, and personal home networks. A firewall is a first network defender that located at the entrance between a private network and the public network. Firewall had this job to monitor the arriving or leaving packet into and f...

Full description

Bibliographic Details
Main Authors: Zarina, Dzolkhifli, Wan Nurul Safawati, Wan Manan, Mohd Hafiz, Mohd Hassin, Dhia Syafiqa, Mohd Jaafar
Format: Article
Language:English
Published: American Scientific Publisher 2018
Subjects:
QA76 Computer software
TK Electrical engineering. Electronics Nuclear engineering
Online Access:http://umpir.ump.edu.my/id/eprint/19617/
http://umpir.ump.edu.my/id/eprint/19617/
http://umpir.ump.edu.my/id/eprint/19617/
http://umpir.ump.edu.my/id/eprint/19617/1/28.%20Firewall%20Redundancy%20Rules%20Filtering%20using%20Integrity%20Rules%20Checking1.pdf
  • Holdings
  • Description
  • Similar Items
  • Staff View

Internet

http://umpir.ump.edu.my/id/eprint/19617/
http://umpir.ump.edu.my/id/eprint/19617/
http://umpir.ump.edu.my/id/eprint/19617/
http://umpir.ump.edu.my/id/eprint/19617/1/28.%20Firewall%20Redundancy%20Rules%20Filtering%20using%20Integrity%20Rules%20Checking1.pdf

Similar Items

  • Pre-Fetch Data Caching Strategy in Mobile Database System for Integrity Constraints Checking
    by: Zarina, Dzolkhifli, et al.
    Published: (2015)
  • Tamper localization for medical images using cyclic redundancy check (CRC)
    by: Wan Nur Shakira Ain, Wan Ranizang
    Published: (2013)
  • Simulated Annealing Based Strategy for Test Redundancy Reduction
    by: Kamal Z., Zamli, et al.
    Published: (2014)
  • Review of firewall optimization techniques
    by: Shakirah, Saidin, et al.
    Published: (2018)
  • An Intelligence Technique For Denial Of Service (Dos) Attack Detection
    by: Wan Nurul Safawati, Wan Manan, et al.
    Published: (2017)

Search Options

  • Advanced Search

Find More

  • Browse the Catalog

Need Help?

  • Search Tips
Cannot write session to /tmp/vufind_sessions/sess_4qghaho0m3o4s0tqn2t7mn4ts5