A Basic Firewall Configuration Strategy for the Protection of Development-related Computer Networks and Subnetworks.
Sujan MaskeyBrittany JansenDennis GusterCharles HallPublished in: Inf. Secur. J. A Glob. Perspect. (2007)
Keyphrases
- computer networks
- network security
- computer network security
- intrusion detection system
- network traffic
- intrusion detection
- computer systems
- anomaly detection
- computer networking
- network management
- network monitoring
- communication networks
- software engineering
- case study
- tcp ip
- information security
- security problems
- database
- pattern recognition
- real time