Search Results - Firewall (networking)
Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 21
- Computer networks 19
- Computer security 16
- Firewalls (computer Security) 8
- Computers 3
- Penetration testing (Computer security) 3
- access control 3
- security measures 3
- Computer hackers 2
- Computer networks x Security measures 2
- Examinations 2
- Moral and ethical aspects 2
- Problems, exercises, etc 2
- Wireless LANs 2
- Automation 1
- Coding theory 1
- Computer crimes 1
- Computer network 1
- Computer network resources 1
- Computer science 1
- Data encryption (Computer science) 1
- Distance education 1
- Electronic data processing departments 1
- Extranets (computer networks) 1
- Firewalls (Computer security) 1
- Firewalls (computer security) 1
- Hacking 1
- History 1
- Industrial engineering 1
- Internet 1
-
1
-
2
Network security, firewalls, and VPNs
Published 2014Table of Contents: “…Part 1. Foundations of network security: Fundamentals of network security -- Firewall fundamentals -- VPN fundamentals -- Network security threats and issues. …”
Book -
3
Network security, firewalls, and VPNs
Published 2021Subjects: “…Firewalls (computer Security)…”
Book -
4
-
5
-
6
-
7
-
8
-
9
Guide to network defense and countermeasures
Published 2003Subjects: “…Computer network resources…”
Book -
10
-
11
-
12
Microsoft Windows server 2008 security resource kit
Published 2008Table of Contents: “…Windows security fundamentals: Subjects, users, and other actors -- Authenticators and authentication protocols -- Objects: the stuff you want -- Understanding user account control (UAC) -- Firewall and network access protection -- Services -- Group policy -- Auditing. …”
Book -
13
Network security essentials applications and standards
Published 2017Table of Contents: “…Malicious Software -- 11. Intruders -- 12. Firewalls…”
Book -
14
Network security essentials applications and standards
Published 2014Table of Contents: “…Ch. 1 Introduction -- Pt. 1 Cryptography -- Ch. 2 Symmetric Encryption and Message Confidentiality -- Ch. 3 Public-Key Cryptography and Message Authentication -- Pt. 2 Network Security Applications -- Ch. 4 Key Distribution an User Authentication -- Ch. 5 Network Access Control and Cloud Security -- Ch. 6 Transport-Level Security -- Ch. 7 Wireless Network Security -- Ch. 8 Electronic Mail Security -- Ch. 9 IP Security -- Pt. 3 System Security -- Ch. 10 Malicious Software -- Ch. 11 Intruders -- Ch. 12 Firewalls -- App. …”
Book -
15
-
16
Cryptography and network security principles and practice
Published 2014Table of Contents: “…Chapter 0 Guide for Readers and Instructors -- Chapter 1 Overview -- Part One Symmetric Ciphers -- Chapter 2 Classical Encryption Techniques -- Chapter 3 Block Ciphers and the Data Encryption Standard -- Chapter 4 Basic Concepts in Number Theory and Finite Fields -- Chapter 5 Advanced Encryption Standard -- Chapter 6 Block Cipher Operation -- Chapter 7 Pseudorandom Number Generation and Stream Ciphers -- Part Two Asymmetric Ciphers -- Chapter 8 More Number Theory -- Chapter 9 Public-Key Cryptography and RSA -- Chapter 10 Other Public-Key Cryptosystems -- Part Three Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- Chapter 12 Message Authentication Codes -- Chapter 13 Digital Signatures -- Part Four Mutual Trust -- Chapter 14 Key Management and Distribution -- Chapter 15 User Authentication -- Part Five Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- Chapter 17 Transport-Level Security -- Chapter 18 Wireless Network Security -- Chapter 19 Electronic Mail Security -- Chapter 20 IP Security -- Appendix A Projects for Teaching Cryptography and Network Security -- Appendix B Sage Examples -- References -- Credits -- Index -- Online Chapters and Appendices1 -- Part Six System Security -- Chapter 21 Malicious Software -- Chapter 22 Intruders -- Chapter 23 Firewalls -- Part seven Legal And Ethical Issues -- Chapter 24 Legal and Ethical Issues -- Appendix C Sage Exercises -- Appendix D Standards and Standards-Setting Organizations -- Appendix E Basic Concepts from Linear Algebra -- Appendix F Measures of Security and Secrecy -- Appendix G Simplified DES -- Appendix H Evaluation Criteria for AES -- Appendix I More on Simplified AES -- Appendix J Knapsack Public-Key Algorithm -- Appendix K Proof of the Digital Signature Algorithm -- Appendix L TCP/IP and OSI -- Appendix M Java Cryptographic APIs -- Appendix N MD5 and Whirlpool Hash Functions -- Appendix O Data Compression Using ZIP -- Appendix P More on PGP -- Appendix Q The International Reference Alphabet -- Appendix R Proof of the RSA Algorithm -- Appendix S Data Encryption Standard (DES) -- Appendix T Kerberos Encryption Techniques -- Appendix U Mathematical Basis of the Birthday Attack -- Appendix V Evaluation Criteria for SHA-3.…”
Book -
17
-
18
Honeypots a new paradigm to information security
Published 2011Subjects: “…Firewalls (computer Security).…”
Book -
19
Network security attacks and countermeasures
Published 2016Table of Contents: “…Gowrison -- Countering RSA vulnerabilities and its replacement by ECC: elliptic curve cryptographic scheme for key generation / Behnam Rahnama, Arif Sari, Marwan Yassin Ghafour -- Changing dynamics of network security involving hacking/cracking with next generation firewalls (NGFW) / Alok Vishwakarma, Wafa Waheeda…”
Book -
20


